Splunk Search

converted values not displaying after rex and eval

codedtech
Path Finder

I'm trying to run this eval statement, but the only value that dispalys in the y value.

my index|rex mode=sed field=capacity_gb "s/[^\d\.,]//g"|rex mode=sed field=vmdkused_gb "s/[^\d\.,]//g"|eval x = tonumber(capacity_gb)|eval y = tonumber(vmdkalloc_gb)|eval z = y/x| table x,y,z

X           Y         Z
             Y
0 Karma

venkasplunk
New Member

From ur below statement, it looks like you are using wrong filed for value Y.

You extracted rex mode=sed field=vmdkused_gb , but you are using y = tonumber(vmdkalloc_gb) , it should be y = tonumber(vmdkused_gb) ???

index|rex mode=sed field=capacity_gb "s/[^\d.,]//g"|rex mode=sed field=vmdkused_gb "s/[^\d.,]//g"|eval x = tonumber(capacity_gb)|eval y = tonumber(vmdkalloc_gb)|eval z = y/x| table x,y,z

0 Karma

Vijeta
Influencer

can you share your events and what fields are you trying to parse.

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...