Splunk Search

Create a new field/column on an event based on another field?

hariivendiran
Engager

I am new to Splunk and I am creating a dashboard with events. I would like to create a new field on the event which will have a value based on another field.

P.S I already included the existing field as part of search .

For example:

When existing field has 'XXX' in it, I need to populate 'ABC' in the new field and 'YYY' as 'CDE'

0 Karma

woodcock
Esteemed Legend

Your sentence can be read 2 ways. @sundareshr has interpreted and answered it one way, here is the other:

... | eval newfield=if(existingfield="XXX", "AAA", null()) | eval YYY=if(existingfield="XXX", "CDE", null()) | ...
0 Karma

sundareshr
Legend

Try this

... | eval newfield=case(existingfield="XXX", "AAA", existingfield="YYY", "CDE", 1=1, null()) | ...
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...