Splunk Search

Splunk If else and severity search query

puneetkharband1
Path Finder

I am trying to write splunk search where I have 2 conditions and my query returns the results based on that 

for example if condition1 matches create a new field (SEVERITY)=SEV2
if condition 2 matches SEVERITY=SEV2 
else SEVERITY=SEV3

How can I achieve this ...In my search string I am using couple of fields to filter the data putting that as SEV2 criteria ...I am able to filter it but and get the results for both the conditions but I am stuck where I cannot call everything else as SEV3

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

 

 

| eval SEVERITY=if(condition1,"SEV2",if(condition2,"SEV2","SEV3"))

 

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

 

 

| eval SEVERITY=if(index=abc AND sourcetype=QWE AND action=XYZ, "SEV2", if(NOT (test=blabla AND action=xyz), "SEV2", "SEV3"))

 

 

Can you give an example of your current queries for a little context to what you are asking for?

0 Karma

puneetkharband1
Path Finder

not sure you understood my question ...thanks for looking into that ....but how to define the condition in the search thats where I am getting confused 

Condition 1
Index=abc sourcetype=QWE
action=XYZ 
OR
condition2
NOT (test=blablaand action=xyz) 

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Get Operational Insights Quickly with Natural Language on the Splunk Platform

In today’s fast-paced digital world, turning data into actionable insights is essential for success. With ...

What’s New in Splunk Observability Cloud – June 2025

What’s New in Splunk Observability Cloud – June 2025 We are excited to announce the latest enhancements to ...

Almost Too Eventful Assurance: Part 2

Work While You SleepBefore you can rely on any autonomous remediation measures, you need to close the loop ...