Splunk Search

Help with EVAL statement

efelder0
Communicator

I am extracting a field called "Severity" out of an XML data feed. and the values that are returned are severity 1, severity 2, severity 3, severity 4. I would like to re-assign the values to now say Low (instead of severity 1), Medium (instead of severity 2), High (instead of severity 3), Critical (instead of severity 4).

I am certain than an EVAL statement would work here, but not sure what the syntax is.

Any suggestions?

Tags (1)
0 Karma
1 Solution

bojanz
Communicator

This will work:

<your search> | eval Severity_string = case(Severity == 1, "Low", Severity == 2, "Medium", Severity == 3, "High", Severity == 4, "Critical")

Then just use Severity_string in table or whatever you use to display the results.

View solution in original post

bojanz
Communicator

This will work:

<your search> | eval Severity_string = case(Severity == 1, "Low", Severity == 2, "Medium", Severity == 3, "High", Severity == 4, "Critical")

Then just use Severity_string in table or whatever you use to display the results.

Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...