Splunk Search

Creating An If Statement

Path Finder

I am trying to create an if statement that if source="fschangemonitor" then it will turn from green to red. Any ideas

Tags (2)
0 Karma
1 Solution

Champion
**search** | eval level = case(source=="fschangemonitor",2) | rangemap field=level low=0-1 severe=2-100 default=severe

Something like that?
I just copied and pasted a search I use to detect Up/Down hosts and to display the status of Up or Down in a coloured box thats red or green dependent on its state.

View solution in original post

0 Karma

Legend

Please give more details. What should turn from green to red? How does your search look right now? Are you familiar with eval's if function?

0 Karma

Champion
**search** | eval level = case(source=="fschangemonitor",2) | rangemap field=level low=0-1 severe=2-100 default=severe

Something like that?
I just copied and pasted a search I use to detect Up/Down hosts and to display the status of Up or Down in a coloured box thats red or green dependent on its state.

View solution in original post

0 Karma