Splunk Search

Setting field value based on another field

tsheets13
Communicator

I have a value in my events called type, which is a single digit integer (1, 2, 3, etc.)

I would like to create a new string field in my search based on that value.

So, something like this pseudocode...

if type = 1 then desc = "pre"
if type = 2 then desc = "current"
if type = 3 then desc = "post"

I realize the splunk doesn't do if/then statements but I thought that was the easiest way to explain.

Thanks

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @tsheets13,
you have to use eval command with case option:

| eval desc=case(type="1","pre",type="2","current",type="3","post")

for more infos see at https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/ConditionalFunctions

Ciao.
Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @tsheets13,
you have to use eval command with case option:

| eval desc=case(type="1","pre",type="2","current",type="3","post")

for more infos see at https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/ConditionalFunctions

Ciao.
Giuseppe

tsheets13
Communicator

Perfect! Thank you

0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...