Splunk Search

How to create a calculated field eval coalesce follow by case statement?

ejwade
Communicator

I'm trying to create a calculated field (eval) that will coalesce a bunch of username fields, then perform match() and replace() functions within a case statement.

Here's a scenario:

  • Possible user fields: UserName, username, User_ID
  • User values need domain removed (e.g., "user@domain.com" or "ad\user" needs to be "user").

Here is how it can be done in two evals (I newlined and indented each case for readability):

 

| eval user_coalesced = coalesce(UserName, username, User_ID)
| eval user = case(
  match(user_coalesced, ".*@.*"), replace(user_coalesced, "@.*", ""),
  match(user_coalesced, "^ad\\\\"), replace(user_coalesced, "^ad\\\\", ""),
  true(), user
)

 

 Any ideas on how I can get this down to one? I thought about putting the coalesce() into each case, but that seems inefficient.

Labels (1)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Maximize the Value from Microsoft Defender with Splunk

<P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" ...

Events has wrong timestamp, How to correct time config?

Hello Splunkers,&nbsp;I've an issue with my event time configuration. It has incorrect timestamp. Below are my ...

What is the use drop_dm_object_name() clause in a query with tstats.?

I am trying to find out what purpose drop_dm_object_name() serves.