All Apps and Add-ons

How to Field extraction / Calculated fields

VijaySrrie
Builder

Hi,

Need one field to be extracted or need a calculated field

I have two fields that are auto-extracted (action and Severity)
Values of action field = read, debug, modify
Values of Severity field = SUCCESS and FAILURE

Out of 100 logs 50 logs are having action field


All logs are having Severity field

Wherever action field is available in the logs, I want the same value, when there is no action field, I want the value of Severity to be disabled under action field


NOTE: For all the logs Index/Sourcetype and source are same

 

Labels (3)
Tags (1)
0 Karma

VijaySrrie
Builder

| eval action=if(isnull(action),severity,action)

It worked with this statement

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Yes, that is essentially what coalesce is doing 😀

ITWhisperer
SplunkTrust
SplunkTrust

Is this what you mean?

| makeresults count=10
| eval action=mvindex(split("read|debug|modify","|"), random()%6)
| eval Severity=mvindex(split("SUCCESS|FAILURE","|"),random()%2)
``` If action is not present, use value from Severity ```
| eval action=coalesce(action,Severity)
0 Karma
Get Updates on the Splunk Community!

New in Observability - Improvements to Custom Metrics SLOs, Log Observer Connect & ...

The latest enhancements to the Splunk observability portfolio deliver improved SLO management accuracy, better ...

Improve Data Pipelines Using Splunk Data Management

  Register Now   This Tech Talk will explore the pipeline management offerings Edge Processor and Ingest ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

Register Join this Tech Talk to learn how unique features like Service Centric Views, Tag Spotlight, and ...