Splunk Search

Help on field renaming wich dont works

jip31
Motivator

hi
I use the serch below wich match the data present in 2 indexes following by host
In LastLogonBoot, the field "host" is well called "host"
But in wire, the field "host" is in reality calles "USERNAME"
So i need to rename USERNAME by host in order to match the 2 indexes but it doenst works
I have tried this :
| rename USERNAME as host
| eval host=if(index=wire, USERNAME,host)
what is the problem please??

[| inputlookup host.csv 
    | table host 
        ] (`LastLogonBoot`) OR (`wire`) earliest=-24h latest=now 
| fields host SystemTime EventCode USERNAME NAME 
| lookup tutu.csv NAME as AP_NAME OUTPUT Building 
| eval SystemTime=strptime(SystemTime, "'%Y-%m-%dT%H:%M:%S.%9Q%Z'") 
| stats latest(SystemTime) as SystemTime by host EventCode 
| xyseries host EventCode SystemTime 
| rename "6005" as LastLogon "6006" as LastReboot 
| eval NbDaysReboot=round((now() - LastReboot )/(3600*24), 0) 
| eval LastReboot=strftime(LastReboot, "%y-%m-%d %H:%M") 
| lookup toto.csv HOSTNAME as host output SITE 
| stats last(LastReboot) as "Last reboot date", last(NbDaysReboot) as "Days without reboot", last(AP_NAME) as AP, last(SITE) as Site by host 
| sort -"Days without reboot"
0 Karma

manjunathmeti
Champion

Hi @jip31,

You need to rename field in macro: wire definition. Add below query in macro `wire` search query.

| eval host = USERNAME
0 Karma

jip31
Motivator

Hi
it doesnt works

0 Karma

manjunathmeti
Champion

Can you provide macro `wire` query?

0 Karma

jip31
Motivator
index="wineventlogfr" sourcetype=WinEventLog (EventCode=6005 OR EventCode=6006)
0 Karma

manjunathmeti
Champion

If you have values for USERNAME field in `wire` then how come eval is not working?

| eval host = USERNAME
0 Karma

jip31
Motivator

i would like to understand....

0 Karma

gaurav_maniar
Builder

Hi,

please try the below updated query,

[| inputlookup host.csv 
     | table host 
         ] (`LastLogonBoot`) OR (`wire`) earliest=-24h latest=now 
 | eval host = if(index="wire", USERNAME, host)
 | fields host SystemTime EventCode NAME 
 | lookup tutu.csv NAME as AP_NAME OUTPUT Building 
 | eval SystemTime=strptime(SystemTime, "'%Y-%m-%dT%H:%M:%S.%9Q%Z'") 
 | stats latest(SystemTime) as SystemTime by host EventCode 
 | xyseries host EventCode SystemTime 
 | rename "6005" as LastLogon "6006" as LastReboot 
 | eval NbDaysReboot=round((now() - LastReboot )/(3600*24), 0) 
 | eval LastReboot=strftime(LastReboot, "%y-%m-%d %H:%M") 
 | lookup toto.csv HOSTNAME as host output SITE 
 | stats last(LastReboot) as "Last reboot date", last(NbDaysReboot) as "Days without reboot", last(AP_NAME) as AP, last(SITE) as Site by host 
 | sort -"Days without reboot"

accept and up-vote the answer if it helps.

0 Karma

jip31
Motivator

Hi
no results...

0 Karma

jip31
Motivator

Is anybody can help?

0 Karma

renjith_nair
Legend

@jip31, in the above the search, on which line you are trying rename/condition?
If you do not have a host value in the events from wire, probably try host=coalesce(host,USERNAME) after line 4

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

jip31
Motivator

hi
I try after line 3
I tried your proposal but it doesnt works

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...