- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Splunk If else and severity search query
I am trying to write splunk search where I have 2 conditions and my query returns the results based on that
for example if condition1 matches create a new field (SEVERITY)=SEV2
if condition 2 matches SEVERITY=SEV2
else SEVERITY=SEV3
How can I achieve this ...In my search string I am using couple of fields to filter the data putting that as SEV2 criteria ...I am able to filter it but and get the results for both the conditions but I am stuck where I cannot call everything else as SEV3
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

| eval SEVERITY=if(condition1,"SEV2",if(condition2,"SEV2","SEV3"))
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

| eval SEVERITY=if(index=abc AND sourcetype=QWE AND action=XYZ, "SEV2", if(NOT (test=blabla AND action=xyz), "SEV2", "SEV3"))
Can you give an example of your current queries for a little context to what you are asking for?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
not sure you understood my question ...thanks for looking into that ....but how to define the condition in the search thats where I am getting confused
Condition 1
Index=abc sourcetype=QWE
action=XYZ
OR
condition2
NOT (test=blablaand action=xyz)
