Splunk Search

How can I create a third field based on unique combinations of two other fields

cmontonen
Explorer

Hello all,
I am really new to Splunk and cannot for the life of me figure this one out.
Unfortunately, Googling around for answers has not been helpful.

I have records which contain two important fields initiator_country and responder_country.
I am interested in observing records with rare combinations of the two fields.
There are 3 possible values for initiator_country and responder_country, so 9 total combinations.
I would like to create a 3rd field for each record indicating which initiator_country - responder_country
combination the record belongs to, but I am not really sure where I should start.

Thank you very much!

Tags (2)
0 Karma
1 Solution

woodcock
Esteemed Legend

Is this what you mean?

... | eval newField = initiator_country . "-" . responder_country

View solution in original post

woodcock
Esteemed Legend

Is this what you mean?

... | eval newField = initiator_country . "-" . responder_country

cmontonen
Explorer

Wow! Thank you very much!
I just tested it and it worked!

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...