Splunk Enterprise

Replace values in query

leandromatperei
Path Finder

Guys.

I have the following query below that shows the results by hosts, it works very well. However, I need to replace the host with another value, example below

 

index=text (host=host1 OR host=host2 OR host=host3 OR host=host4)) 
 timechart span=1h count by host
host1 = Valuea
host2 = Valueb
host3 = Valuec
host4= Valued

 

What is the best way to make this replacement using eval or a lookup?

Att.

Labels (2)
Tags (2)
0 Karma

manjunathmeti
Champion

hi @leandromatperei,
You can use eval command with case function.

| eval host=case(host="host1", "Valuea", host="host1", "Valueb", host="host1","Valuec", host="host1", "Valued") 

 

If this reply helps you, an upvote/like would be appreciated.

0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...