Splunk Search

Eval is failing to set field values?

mixolydian
Path Finder

I'm sure I'm missing something simple, but I suddenly can't get the eval command to work. Simplest case, the following search never sets the test1 field.

index="*" | head 1 | eval test1 = 'splunk is driving me crazy' | table _time, test1

The _time field is populated, but test1 is always empty. Can anyone explain this to me?

Tags (1)
0 Karma
1 Solution

mixolydian
Path Finder

Nevermind, I figured it out. It's the single quotes quietly failing.

View solution in original post

0 Karma

mixolydian
Path Finder

Nevermind, I figured it out. It's the single quotes quietly failing.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...