Splunk Search

How to assign value to a field which is not present in some of the events and compare that value with other values from other events where that field is present?

abhi04
Communicator

How to assign value to a field which is not present in some of the events and compare that value with other values from other events where that field is present?

I have events where field named "SSLProxyEngine" have values "ON" or "OFF" for some of the events but for some events that field is not present. I want to assign value "NONE" to SSlProxyEngine where the field is not present and then compare this value with othere events value.

How can I do that?

Tags (1)
0 Karma

MuS
Legend

Hi abhi04,

first you run your search to get the events and add an eval statement to check if the field exists or not, and if not assign it the value. Try this:

 your search here
 | eval SSLProxyEngine = case(isnull(SSLProxyEngine), "NONE", isnotnull(SSLProxyEngine), SSLProxyEngine, 1=1, "unknown")

the last option is for events that does not match anything 😉

Hope this helps ...

cheers, MuS

Sukisen1981
Champion

| eval yourfield=if(isnull(yourfield),"NONE",yourfield)

0 Karma
Get Updates on the Splunk Community!

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...