Splunk Search

Shouldn't this map command work?

wkupersa
Path Finder

|stats count|eval cip='foo'|map search="search index=* Address=$cip$"

It errors out saying "Error in 'map': Did not find value for required attribute 'cip'."

Tags (2)
0 Karma
1 Solution

MuS
SplunkTrust
SplunkTrust

Hi wkupersa,

use it like this:

|stats count|eval cip="foo"|map search="search index=* Address=$cip$"

This will set the value of cip to be foo. In your original search you did set the value of cip to be the value of the field called foo.

Hope this helps ...

cheers, MuS

View solution in original post

MuS
SplunkTrust
SplunkTrust

Hi wkupersa,

use it like this:

|stats count|eval cip="foo"|map search="search index=* Address=$cip$"

This will set the value of cip to be foo. In your original search you did set the value of cip to be the value of the field called foo.

Hope this helps ...

cheers, MuS

wkupersa
Path Finder

Geez. Single quotes versus double. Feeling brain dead. Thanks!

0 Karma

MuS
SplunkTrust
SplunkTrust

you're welcome 🙂

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...