Splunk Search

How to create a new field using eval and display it in a table?

mdufrasne
Explorer

I am struggling to make eval work with table.
Check out the screenshot below:

alt text

I would expect this to create a field titled Event_Detail, that it would represent the length and that they would be displayed with the table command, but that is not the case here.

I'm sure I am missing something simple.

0 Karma
1 Solution

jpolcari
Communicator

Try placing the field name within quotes: len("logdata.processInfo.ProcessName")

View solution in original post

jpolcari
Communicator

Try placing the field name within quotes: len("logdata.processInfo.ProcessName")

somesoni2
Revered Legend

Dot (.) is a special char in eval (for concatenation) so you would need to quote it, single and double quotes both will work.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...