Splunk Search

Case condition in like?

karthi2809
Builder

Thanks in Advance .

I need to show status 

If the P_RETURN_STATUS is success then it SUCCESS,IF error then ERROR ,IF P_RETURN_STATUS is error and P_MESSAGE is NO NEW BATCH EXISTS as SUCCESS .But already the P_RETURN_STATUS having values as error .How to override when using AND condition

 

 

| eval P_RETURN_STATUS=case(like('P_RETURN_STATUS' ,"%SUCCESS%"),"SUCCESS", like('P_RETURN_STATUS',"%ERROR%"),"ERROR",like('P_MESSAGE',"%NO NEW BATCH EXISTS%") AND like('P_RETURN_STATUS',"%ERROR%"),"SUCCESS")

 

 

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The case function exits at the first match and does not evaluate the remaining expressions.  Put the AND condition first so it is evaluated before the others.

| eval P_RETURN_STATUS=case(like('P_MESSAGE',"%NO NEW BATCH EXISTS%") AND like('P_RETURN_STATUS',"%ERROR%"),"SUCCESS",
                            like('P_RETURN_STATUS' ,"%SUCCESS%"),"SUCCESS", 
                            like('P_RETURN_STATUS',"%ERROR%"),"ERROR",
                            1==1, "???")

 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

The case function exits at the first match and does not evaluate the remaining expressions.  Put the AND condition first so it is evaluated before the others.

| eval P_RETURN_STATUS=case(like('P_MESSAGE',"%NO NEW BATCH EXISTS%") AND like('P_RETURN_STATUS',"%ERROR%"),"SUCCESS",
                            like('P_RETURN_STATUS' ,"%SUCCESS%"),"SUCCESS", 
                            like('P_RETURN_STATUS',"%ERROR%"),"ERROR",
                            1==1, "???")

 

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...