Splunk Search

Why doesn't this eval statement work?

dbcase
Motivator

Hi,

I have this query

index=wholesale_app buildTarget=comcast analyticType=SessionStart   |rename Properties.platformData.HC as hc|rename Properties.platformData.HM as hm|eval hardwaretype=hc+hm|table hardwaretype hc hm

Why won't the eval....well eval?

I've also tried this

index=wholesale_app buildTarget=comcast analyticType=SessionStart   |rename Properties.platformData.HC as hc|rename Properties.platformData.HM as hm|eval hardwaretype=hc+" "+hm|table hardwaretype hc hm

and this

index=wholesale_app buildTarget=comcast analyticType=SessionStart   |rename Properties.platformData.HC as hc|rename Properties.platformData.HM as hm|eval hardwaretype='hc'+" "+'hm'|table hardwaretype hc hm

the resulting table shows values for hc and hm but no values for hardwaretype

Tags (2)
0 Karma

niketn
Legend

@dbcase, We would like to know what is not working with eval, can you put the tabular output of your search preferably the following?

index=wholesale_app buildTarget=comcast analyticType=SessionStart    |rename Properties.platformData.HC as hc|rename Properties.platformData.HM as hm|eval hardwaretype=hc+" "+hm|table hardwaretype hc hm
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

mtulett_splunk
Splunk Employee
Splunk Employee

If both fields are strings, you can use strcat instead, which is a bit simpler to work with. Replace your eval command with:

| strcat hc " " hm hardwaretype

This will create a new field "hardwaretype" with your two strings and a space in between.

Without knowing what your fields have in them, I worry that eval is attempting to sum your fields, rather than concatenate them. If you want to use eval specifically, you can try using periods instead of plus signs - this is the preferred format for joining text:

| eval hardwaretype=hm." ".hc

Or even:

| eval hardwaretype=tostring(hm)." ".tostring(hc)
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...