Splunk Search

How to compare and save the values between some columns

ruchijain
New Member

Hi all,
I have below input:

alt text

Now I want to do below comparision:

(Row1 = started AND row2=started ) OR (row3="started" AND Row4="started")

The result is good otherwise result is bad.

I don't know how to do that comparison and save the value, can anyone please help?

0 Karma
1 Solution

renjith_nair
Legend

@ruchijain,

You have almost the solution in your question itself. Probably you haven't specified the fields correctly

| eval result=if(('row 1' = "started" AND 'row 2'="started" ) OR ('row 3'="started" AND 'row 4'="started"),"good","bad")
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@ruchijain,

You have almost the solution in your question itself. Probably you haven't specified the fields correctly

| eval result=if(('row 1' = "started" AND 'row 2'="started" ) OR ('row 3'="started" AND 'row 4'="started"),"good","bad")
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

ruchijain
New Member

Hi Renjith,

Please find the image attahced:

But if i will look for bad it will alert for the first row but i think i got the option like if number of result if greater than 1 then it will alert.

Can i use this query?

eventtype=cxp_editorial_mob | chart latest(status) as status by raxhost | transpose | eval result=if(('row 1'!= "started" AND 'row 2'!="started" ) OR ('row 3'="started" AND 'row 4'="started"),"good","bad")

alt text

0 Karma

renjith_nair
Legend
    eventtype=cxp_editorial_mob | chart latest(status) as status by raxhost | transpose | eval result=if(('row 1'!= "started" AND 'row 2'!="started" ) OR ('row 3'="started" AND 'row 4'="started"),"good","bad")
    |where result=="bad"

and then trigger alert if Number of Results is greater than 0.

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

ruchijain
New Member

Thanks renjith for the answer.

Just need one more i got below output:

alt text

I want to juts check for the row status if it is good or bad...

Means i want to get alert if the status row is bad... how to do that

0 Karma

renjith_nair
Legend

@ruchijain,
the image is not available. You could add |where result=="bad" to your search and trigger alert if Number of Results is greater than 0

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...