Splunk Search

How to set a Variable from an Eval match?

stakor
Path Finder

I am trying to set a new variable for each event, by using the eval command. Maybe I should a different command?

I want to set a variable, isImportant, by IP address. I am trying to see if it falls into two or more ranges (10.1.1.* or 10.1.2.*). If the IP is in one of those ranges, I would like to have the variable isImportant set to true, otherwise set to false.

I saw the following page:
http://docs.splunk.com/Documentation/SplunkCloud/6.6.0/SearchReference/Eval

And it has an example for using one cidr range to set isLocal. I imagine I can use the example of:

| eval isImportant=if(cidrmatch("10.1.1.0/24", clientip), "true", "false")

for one range. When I try to use two ranges, it does not work.

| eval isImportant=if((cidrmatch("10.1.1.0/24", clientip)) OR (cidrmatch("10.1.2.0/24", clientip)))

The second example does not work.

Is there a way to combine conditions into the eval?

0 Karma

somesoni2
Revered Legend

You just specified the condition in if condition but no if-true and if-false actions.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Have you tried | eval isImportant=if((cidrmatch("10.1.1.0/24", clientip)) OR (cidrmatch("10.1.2.0/24", clientip)), "true", "false")?

---
If this reply helps you, Karma would be appreciated.
0 Karma

stakor
Path Finder

This works. And I think would be my first choice of solution. Not sure if I can accept this as the solution or not though.

0 Karma

somesoni2
Revered Legend

Now you should be.

0 Karma

cpetterborg
SplunkTrust
SplunkTrust

Try:

| makeresults | eval clientip="10.1.3.4" | eval isImportant=if(((cidrmatch("10.1.1.0/24", clientip)) OR (cidrmatch("10.1.2.0/24", clientip))), "true", "false")

Works with 10.1.1.4 and 10.1.2.4 properly, so you can try that.

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...