Splunk Search

Exclude specific values from Eval case matches

neerajs_81
Builder

Hello, 

How can I get my eval case like to match all values  except a  specific value ?

I have below values for a field called rule_name

MMT01_windows_brute_force

MMT02_linux_root_login

MMT03_Aws_guardduty_alert

How to get eval to match everything except anything with AWS in the name ? I need to use wildcard % for the matching part because there r many matches but just exclude AWS ones.

I  found a similar post here where the answer was to user AND! To exclude  But that syntax is no longer supported it seems.

| eval rule_type= case(like(rule_name,"MHE0%"),onprem,cloud)

Expected result: rule_type should end up having 2 values for MMT01 and 02  using a wildcard and MMT03 should be  considered as cloud

Labels (2)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

Your description is not very clear but you can either use if with eval to check if some complex condition is fulfilled like for example:

| eval rule_type=if(like(rule_name,"MHE0%") OR like (rule_name,"%AWS%"),"cloud","prem")

(forget the actual logic, it's the syntax that's important here).

or

use the case() statement to form something of an ACL:

| eval rule_type=case(like(rule_name,"%AWS%"),"cloud",like(rule_name,"MHE0%"),"onprem",1=1,"cloud default")

 

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

You could use match and a regex

| eval rule_type=if(match(_raw,"MMT\d+_(?:[^_]+(?<!Aws))_"),"onprem","cloud")

PickleRick
SplunkTrust
SplunkTrust

Your description is not very clear but you can either use if with eval to check if some complex condition is fulfilled like for example:

| eval rule_type=if(like(rule_name,"MHE0%") OR like (rule_name,"%AWS%"),"cloud","prem")

(forget the actual logic, it's the syntax that's important here).

or

use the case() statement to form something of an ACL:

| eval rule_type=case(like(rule_name,"%AWS%"),"cloud",like(rule_name,"MHE0%"),"onprem",1=1,"cloud default")

 

Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...