Splunk Search

Using field eval values in if condition.

veerendra_modi
Loves-to-Learn

I have a search as below:

|rex field=Field "^(?.+?)."
| eval Srvr = if(sourcetype="Type_1", Field_1 , if(sourcetype="Type_2", Field_2, "NA"))
| table Id sourcetype Field_1 Srvr

I have two fields
Field_1 that is in sourcetype="Type_1"
Field_2 that is in sourcetype="Type_2"
I want to take the values of these field in one field that is Srvr in the searxh above.

Please suggest as the query is not picking up the values from the fields Field_1 and Filed_2 but the if condition is working with harcoded values.

Tags (1)
0 Karma

somesoni2
Revered Legend

Try this

....| eval Srvr=coalesce(Field_1, Field_2, "NA") | table ....rest of the command
0 Karma
Get Updates on the Splunk Community!

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...

Reminder! Splunk Love Promo: $25 Visa Gift Card for Your Honest SOAR Review With ...

We recently launched our first Splunk Love Special, and it's gone phenomenally well, so we're doing it again, ...