Splunk Search

How to use NOT match condition in Case statement for Multi valued field

manjunath_0208
Loves-to-Learn Everything

|eval SNOW_Description=case(EMGC_ADMINSERVER_Status!="k1","Java Process EMGC_ADMINSERVER data not available in splunk on host, EMGC_ORACLE_Status!="k2","Java Process EMGC_ORACLE data not available in splunk on host)

 

Here I am trying to use multiple fields inside case statement. I am not getting correct output. How can this be achieved?

Labels (1)
0 Karma

manjunath_0208
Loves-to-Learn Everything

|eval SNOW_Description=case(EMGC_ADMINSERVER_Status!="k1","Java Process EMGC_ADMINSERVER data not available in splunk on host, EMGC_ORACLE_Status!="k2","Java Process EMGC_ORACLE data not available in splunk on host)

 

In the above query, I am getting the output if the first condition EMGC_ADMINSERVER_Status!="k1" is met.

I am expecting to get the output when both conditions EMGC_ADMINSERVER_Status!="k1 and EMGC_ORACLE_Status!="k2" are met.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Case is evaluated from the left until a condition is met.

So if the first condition is met, subsequent ones are not evaluated. You might want to rethink your conditions/evaluation order.

richgalloway
SplunkTrust
SplunkTrust

What output are you getting and what output do you expect?  The title of the post says "multi valued field", but the body says "multiple fields".  That's two different things so which is the case?  The latter is commonplace and should work easily, whereas the former requires one or more mv* functions.

That looks like it should work once the quotation marks are matched up.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...