<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple search with eval. Why is no table shown? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213141#M62510</link>
    <description>&lt;P&gt;Why use &lt;CODE&gt;case()&lt;/CODE&gt; here instead of &lt;CODE&gt;if()&lt;/CODE&gt;?&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2020 13:44:44 GMT</pubDate>
    <dc:creator>wmyersas</dc:creator>
    <dc:date>2020-03-03T13:44:44Z</dc:date>
    <item>
      <title>Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213135#M62504</link>
      <description>&lt;P&gt;Here is the search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* sourcetype=Vectra-CEF vendor="Vectra Networks" cat!="HOST SCORING" |eval check_cat=case(cat="Command &amp;amp; Control" OR cat="Reconnaissance" OR cat="Lateral Movement" OR cat="Botnet Activity" OR cat="Exfiltration","true")| table cat | where check_cat="true" 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I get events back from the search,t but the table is not built up.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 18:32:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213135#M62504</guid>
      <dc:creator>alex1895</dc:creator>
      <dc:date>2016-02-19T18:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213136#M62505</link>
      <description>&lt;P&gt;Does Verbose Mode show events with the 'cat' field having the specified values?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 18:59:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213136#M62505</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2016-02-19T18:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213137#M62506</link>
      <description>&lt;P&gt;Yes, the 'cat' field has specified values. But for some reason the eval filter does not work. The events also show cat field values excluded in the eval filter.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 19:52:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213137#M62506</guid>
      <dc:creator>alex1895</dc:creator>
      <dc:date>2016-02-19T19:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213138#M62507</link>
      <description>&lt;P&gt;The table command you used is limiting the fields to just &lt;CODE&gt;cat&lt;/CODE&gt;, hence your where clause is failing as the field &lt;CODE&gt;check_cat&lt;/CODE&gt; is not available. Try like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* sourcetype=Vectra-CEF vendor="Vectra Networks" cat!="HOST SCORING" |eval check_cat=case(cat="Command &amp;amp; Control" OR cat="Reconnaissance" OR cat="Lateral Movement" OR cat="Botnet Activity" OR cat="Exfiltration","true") | where check_cat="true" 
 | table cat 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR more efficient method&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  index=* sourcetype=Vectra-CEF vendor="Vectra Networks" cat="Command &amp;amp; Control" OR cat="Reconnaissance" OR cat="Lateral Movement" OR cat="Botnet Activity" OR cat="Exfiltration"   | table cat 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 19 Feb 2016 20:18:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213138#M62507</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-02-19T20:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213139#M62508</link>
      <description>&lt;P&gt;Thanks both searches work.  I realized that the Boolean expressions are case sensitive thats why my searches also did not work.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 20:53:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213139#M62508</guid>
      <dc:creator>alex1895</dc:creator>
      <dc:date>2016-02-19T20:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213140#M62509</link>
      <description>&lt;P&gt;Yes, when used in &lt;CODE&gt;EVAL&lt;/CODE&gt;/&lt;CODE&gt;WHERE&lt;/CODE&gt; strings are case-sensitive, but if used in base search OR &lt;CODE&gt;SEARCH&lt;/CODE&gt; command, they are not.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 21:24:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213140#M62509</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-02-19T21:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213141#M62510</link>
      <description>&lt;P&gt;Why use &lt;CODE&gt;case()&lt;/CODE&gt; here instead of &lt;CODE&gt;if()&lt;/CODE&gt;?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 13:44:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213141#M62510</guid>
      <dc:creator>wmyersas</dc:creator>
      <dc:date>2020-03-03T13:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213142#M62511</link>
      <description>&lt;P&gt;there is no &lt;EM&gt;else&lt;/EM&gt; operation.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 21:46:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213142#M62511</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-03T21:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Simple search with eval. Why is no table shown?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213143#M62512</link>
      <description>&lt;P&gt;Sure there is: &lt;CODE&gt;|eval check_cat=if(cat="Command &amp;amp; Control" OR cat="Reconnaissance" OR cat="Lateral Movement" OR cat="Botnet Activity" OR cat="Exfiltration","true",null())&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 15:16:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-search-with-eval-Why-is-no-table-shown/m-p/213143#M62512</guid>
      <dc:creator>wmyersas</dc:creator>
      <dc:date>2020-03-04T15:16:40Z</dc:date>
    </item>
  </channel>
</rss>

