Splunk Search

How to calculate field to replace value of field?

jason_hotchkiss
Communicator

Hello - 

I have a table with the following:

host

HOST FQDN DNS_NAME HOST_MATCH INDEX
hostalpha hosta.mydomain.com hosta false index_a
hosta host - true index_b


Created from the following search:

base_search
| rex field=FQDN ""^(?<DNS_NAME>[^.]+)\..*$"
| fillnull value="-" DNS_NAME
|eval HOST_MATCH="if(host='DNS_NAME',"true","false")

How would I replace the do the following:

1.  If HOST != DNS_NAME, Make HOST = DNS_NAME
2.  If DNS_NAME = "-" MAKE DNS_NAME = HOST

Thanks!

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Just do the evaluations in the opposite order

| eval DNS_NAME=if(DNS_NAME == "-", HOST, DNS_NAME)
| eval HOST=if(HOST != DNS_NAME, DNS_NAME, HOST)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Just do the evaluations in the opposite order

| eval DNS_NAME=if(DNS_NAME == "-", HOST, DNS_NAME)
| eval HOST=if(HOST != DNS_NAME, DNS_NAME, HOST)

jason_hotchkiss
Communicator

@ITWhisperer thank you.  I was way overthinking this.  Much appreicated!

0 Karma
Get Updates on the Splunk Community!

Observability | How to Think About Instrumentation Overhead (White Paper)

Novice observability practitioners are often overly obsessed with performance. They might approach ...

Cloud Platform | Get Resiliency in the Cloud Event (Register Now!)

IDC Report: Enterprises Gain Higher Efficiency and Resiliency With Migration to Cloud  Today many enterprises ...

The Great Resilience Quest: 10th Leaderboard Update

The tenth leaderboard update (11.23-12.05) for The Great Resilience Quest is out &gt;&gt; As our brave ...