Splunk Search

Question about eval if 4 arguments

Abarny
Path Finder

Hi, i try to select on same event with different Values and they give result différent but Splunk find none result. Can you tell me what is wrong on my command ? Thanks

eval Agent= if(isnull(Agent) OR ( Agent=="aaa*", "bbb*") OR (Agent=="ccc*" , "ddd*" ,"reee*")OR (Agent=="*"),Messagerie, AC,MANAGERS,TECHNICIENS )

Tags (2)
0 Karma
1 Solution

Abarny
Path Finder

Thanks :).

I try with your solution but I think it's false again. I am a trainee and I try to do my best. So just bear with me. ( and with my English :))

eval Personnel =case(Agent == null() , "Messagerie", Agent ==("aa*" OR "bb*"), "AC", Agent=="*",TECHNICIENS) |stats count by Personnel

The last Agent is for give the reste of the values

View solution in original post

0 Karma

Abarny
Path Finder

Thanks :).

I try with your solution but I think it's false again. I am a trainee and I try to do my best. So just bear with me. ( and with my English :))

eval Personnel =case(Agent == null() , "Messagerie", Agent ==("aa*" OR "bb*"), "AC", Agent=="*",TECHNICIENS) |stats count by Personnel

The last Agent is for give the reste of the values

0 Karma

Abarny
Path Finder

Thanks you Somesoni2 !!

0 Karma

somesoni2
Revered Legend

Give this a try

eval Personnel =case(isnull(Agent) , "Messagerie", like(Agent,"aa%") OR like(Agent,"bb%"), "AC", 1=1,TECHNICIENS) |stats count by Personnel

So,
If Agent is null - Personnel=Messagerie
if Agent="aa*" OR Agent="bb*"(in search * is wildcard, for like function in eval , % is wildcard), Personnel=AC
For all other cases, Personnel=TECHNICIENS

Abarny
Path Finder

Thanks you Somesoni2 !!

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

(field="value1", "value2") is not a valid eval expression. If you're looking for a list of possible values, you will need to spell them out explicitly like this: (field="value1" OR field="value2").

Similarly, if() only takes three arguments - the condition, the then-value, and the else value. If you're trying to test several conditions and yield a different result for each condition, you'll want to use case() like this: case(condition1, value1, condition2, value2, ...)

http://docs.splunk.com/Documentation/Splunk/6.5.2/SearchReference/CommonEvalFunctions#Comparison_and...

Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...