Splunk Search

How to assign value to a field which is not present in some of the events and compare that value with other values from other events where that field is present?

abhi04
Path Finder

How to assign value to a field which is not present in some of the events and compare that value with other values from other events where that field is present?

I have events where field named "SSLProxyEngine" have values "ON" or "OFF" for some of the events but for some events that field is not present. I want to assign value "NONE" to SSlProxyEngine where the field is not present and then compare this value with othere events value.

How can I do that?

Tags (1)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi abhi04,

first you run your search to get the events and add an eval statement to check if the field exists or not, and if not assign it the value. Try this:

 your search here
 | eval SSLProxyEngine = case(isnull(SSLProxyEngine), "NONE", isnotnull(SSLProxyEngine), SSLProxyEngine, 1=1, "unknown")

the last option is for events that does not match anything 😉

Hope this helps ...

cheers, MuS

Sukisen1981
Champion

| eval yourfield=if(isnull(yourfield),"NONE",yourfield)

0 Karma
Get Updates on the Splunk Community!

.conf23 Registration is Now Open!

Time to toss the .conf-etti 🎉 —  .conf23 registration is open!   Join us in Las Vegas July 17-20 for ...

Don't wait! Accept the Mission Possible: Splunk Adoption Challenge Now and Win ...

Attention everyone! We have exciting news to share! We are recruiting new members for the Mission Possible: ...

Unify Your SecOps with Splunk Mission Control

In today’s post, I'm excited to share some recent Splunk Mission Control innovations. With Splunk Mission ...