Splunk Dev

USE AND Operator in IF or CASE statement

kumagaur
New Member

I have one lookup in which there is a field which consist
Team Member
A1
A2
A3
A4
A5
A6
A7
Now,If
TeamMember=(A1 OR A2) AND A4 AND A7 then print Aseries
TeamMember=(A1 OR A2) and A5 AND A6 then print Bseries

I tried |eval Team=if((con1=="A1 OR con1=A2)"AND con1=="A4" AND con1=A7,Aseries,Other)

I used case as well but no luck.

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

Maybe like this:

Your Base Search Here
| appendpipe [|inputlookup TeamMember.csv | stats values(TeamMember) AS con1]
| eval Team=if(((con1=="A1" OR con1=="A2") AND con1=="A4" AND con1=="A7"), "Aseries", "Bseries")

View solution in original post

0 Karma

woodcock
Esteemed Legend

Maybe like this:

Your Base Search Here
| appendpipe [|inputlookup TeamMember.csv | stats values(TeamMember) AS con1]
| eval Team=if(((con1=="A1" OR con1=="A2") AND con1=="A4" AND con1=="A7"), "Aseries", "Bseries")
0 Karma

vishaltaneja070
Motivator

Try this:
| eval Team= if((con1== "A1" OR con1=="A2") AND con1=="A4" AND con1="A7", Aseries, Other)

0 Karma

renjith_nair
Legend

@kumagaur ,
Do you have multiple values of con1 in a single event ? If not AND condition will not work. Do you have some sample events ?

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...