Splunk Search

Create a new field based on existing filelds

sidtalup27
Explorer

Hello,

My requirement is if the field "fields.summary" contains events that contain ".DT", then I want to create a new field "Summary", and set the value of the new field as Security Incident. I have created the below query, but its not working as expected. 

index="main" AND source=jira | spath
| eval summary=if(match (fields.summary,".DT-"),"Security Incident","no")

Please advise.

--
Thanks,
Siddarth

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

The match function uses a regular expression syntax to match the value in the field - "." is a wildcard character in regular expressions so these (along with other special characters) need to be escaped.  Field names with special characters should also be quoted with single quotes. Try this

index="main" AND source=jira | spath
| eval summary=if(match ('fields.summary',"\.DT\-"),"Security Incident","no")

 

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

The match function uses a regular expression syntax to match the value in the field - "." is a wildcard character in regular expressions so these (along with other special characters) need to be escaped.  Field names with special characters should also be quoted with single quotes. Try this

index="main" AND source=jira | spath
| eval summary=if(match ('fields.summary',"\.DT\-"),"Security Incident","no")

 

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...