Splunk Search

If a value contains a value it changes to another.

Talking_Master
Explorer

Hi Iam looking to create an if statement:  if value  contains part of another value  it changes it too another value.

for example contains x its true if not its false.   

 | eval error=if(in(status, "error", "failure", "severe"),"true","false")

I also want it for many values.

Labels (1)
0 Karma
1 Solution

andrew_nelson
Communicator

Using the match() function should do what you need. 

| eval error=if(match(status, "(?i)error") OR match(status, "(?i)failure") OR match(status, "(?i)severe"),"true","false")

 

If however you have a bunch of matching patterns, having all of them in a lookup file and using wildcard matching might be a better option. 

View solution in original post

andrew_nelson
Communicator

Using the match() function should do what you need. 

| eval error=if(match(status, "(?i)error") OR match(status, "(?i)failure") OR match(status, "(?i)severe"),"true","false")

 

If however you have a bunch of matching patterns, having all of them in a lookup file and using wildcard matching might be a better option. 

Talking_Master
Explorer

Thanks for the solution. But If theres value say it has  server 1 failed. How do I one look for if value has failed in its string then it does somthing.

 

0 Karma

andrew_nelson
Communicator

You can use match(status, "(?i)fail") and it'll match failed, fail, failure, failing.

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...