i want to check one condition in splunk and if that condition match and then i need to get those events who matches condition else result should be null
LAST < sysdate - (1/(2*24))
LAST is one field in splunk and can one help me out here.
for sysdate -(1/(2*24)) i have done eval tnow = now() | eval finalvalue=tnow-0.0208333333333333
eval tnow = now() | eval finalvalue=tnow-0.0208333333333333
so now i have to check the LAST < finalvalue
I have tried this
search string |eval tnow = now() | eval finalvalue=tnow-0.0208333333333333| eval Severity=if(LAST < finalvalue,NODE,null()) | table Severity,NODE
when i am doing this if condition doesn't match also it is creating table with first field as null.
Can anyone help me out here
Hello Everyone i have used where condition LAST > finalvalue
View solution in original post