Splunk Search

How can I do different searches based on the inputfield value?

alex_kh
Explorer

Hello everybody,

In my dashboard i have two input fields
Primary_field =*
Secondary field=*

my current search looks like

index=* ip=$primary_filed_value$

I want extend it with the secondary field.

But if write my search like

index=\* ip=$primary_filed_value$ user=$secondary_filed_value$

and the *$secondary_filed_value$ = **
i get ONLY the results where user != NULL

But i need everything

ip
1.1.1.1 alex
1.1.1.1 bill
1.1.1.1 NULL

Any ideas?

Tags (1)
0 Karma
1 Solution

kmaron
Motivator

you could load the user field with values so that there never is a NULL

index=* ip=$primary_filed_value$
| eval user = if(length(user)>0,user,"none")
| search user=$secondary_filed_value$

View solution in original post

kmaron
Motivator

you could load the user field with values so that there never is a NULL

index=* ip=$primary_filed_value$
| eval user = if(length(user)>0,user,"none")
| search user=$secondary_filed_value$

renjith_nair
Legend

@alex_kh,

Try adding

user="*" OR NOT user="*"

Here is a run anywhere example with inputs and tokens covering both empty and null

<form>
  <label>Adding Null when selecting All</label>
  <fieldset submitButton="false">
    <input type="dropdown" token="username">
      <label>UserName</label>
      <choice value="*">All</choice>
      <choice value="admin">Admin</choice>
      <default>*</default>
      <initialValue>*</initialValue>
      <change>
        <condition label="All">
          <set token="username">"*" OR NOT user="*"</set>
        </condition>
      </change>
    </input>
  </fieldset>
  <row>
    <panel>
      <table>
        <search>
          <query>|makeresults|eval user="admin,nonadmin,EMPTY,NULL"|makemv user delim=","
                 |mvexpand user|eval user=if(user="NULL",null(),user)
                 |replace EMPTY with ""
                 |search user=$username$</query>
          <earliest>-15m</earliest>
          <latest>now</latest>
        </search>
        <option name="drilldown">none</option>
      </table>
    </panel>
  </row>
</form>
---
What goes around comes around. If it helps, hit it with Karma 🙂

alex_kh
Explorer

first search is obviously index=* bla bla bla

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...