Splunk Enterprise

Replace values in query

leandromatperei
Path Finder

Guys.

I have the following query below that shows the results by hosts, it works very well. However, I need to replace the host with another value, example below

 

index=text (host=host1 OR host=host2 OR host=host3 OR host=host4)) 
 timechart span=1h count by host
host1 = Valuea
host2 = Valueb
host3 = Valuec
host4= Valued

 

What is the best way to make this replacement using eval or a lookup?

Att.

Labels (2)
Tags (2)
0 Karma

manjunathmeti
Champion

hi @leandromatperei,
You can use eval command with case function.

| eval host=case(host="host1", "Valuea", host="host1", "Valueb", host="host1","Valuec", host="host1", "Valued") 

 

If this reply helps you, an upvote/like would be appreciated.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...