Splunk Search

Eval for known and unknown field values

ashabc
Contributor

I am using a search command to rename ip address output to device names something like below:

sourcetype=syslog | eval srcip = case(srcip = "192.168.x.5","Samsung S4", srcip = "192.168.x.8","iPhone5", srcip = "192.168.x.10","Laptop") | rename "srcip" as "Device Name"  | stats count by "Device Name" 

The problem is with the above command is, it only displays the devices that are in the case statement. How can I display all the devices in the sourcetype/log both defined in the case statement and those are not defined (the IP address instead of name is fine for the devices which are not defined in the case statement). For example there could be a device in the logfile with srcip=192.168.x.21 which is not defned in the case statement, and hence will not show in the output, but I would lke this device be displayed as 192.168.x.21 in the stats command output.

Tags (3)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Make your case() keep the original value for unknown values like this:

... | eval srcip = case(srcip = "192.168.x.5","Samsung S4", srcip = "192.168.x.8","iPhone5", srcip = "192.168.x.10","Laptop", 1=1, srcip)

As an entirely different alternative, define a lookup table containing your known mapped values. That'll keep this knowledge out of potentially many searches.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Make your case() keep the original value for unknown values like this:

... | eval srcip = case(srcip = "192.168.x.5","Samsung S4", srcip = "192.168.x.8","iPhone5", srcip = "192.168.x.10","Laptop", 1=1, srcip)

As an entirely different alternative, define a lookup table containing your known mapped values. That'll keep this knowledge out of potentially many searches.

ashabc
Contributor

Thank you Martin for responding to my post. When I use the command you suggested, it throws an error "Unknown search command 'case'. "
Any syntax issue in 1=1, srcip ?

0 Karma

ashabc
Contributor

Sorry my bad. Its was indded a syntax from my end. Thank you so much for your help, Martin.

0 Karma

_d_
Splunk Employee
Splunk Employee

You need to do the eval and rename after your stats:

sourcetype=syslog | stats count by srcip | eval srcip = case(srcip = "192.168.x.5","Samsung S4", srcip = "192.168.x.8","iPhone5", srcip = "192.168.x.10","Laptop", true(), srcip) | rename "srcip" as "Device Name" 
0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...