Splunk Search

converted values not displaying after rex and eval

codedtech
Path Finder

I'm trying to run this eval statement, but the only value that dispalys in the y value.

my index|rex mode=sed field=capacity_gb "s/[^\d\.,]//g"|rex mode=sed field=vmdkused_gb "s/[^\d\.,]//g"|eval x = tonumber(capacity_gb)|eval y = tonumber(vmdkalloc_gb)|eval z = y/x| table x,y,z

X           Y         Z
             Y
0 Karma

venkasplunk
New Member

From ur below statement, it looks like you are using wrong filed for value Y.

You extracted rex mode=sed field=vmdkused_gb , but you are using y = tonumber(vmdkalloc_gb) , it should be y = tonumber(vmdkused_gb) ???

index|rex mode=sed field=capacity_gb "s/[^\d.,]//g"|rex mode=sed field=vmdkused_gb "s/[^\d.,]//g"|eval x = tonumber(capacity_gb)|eval y = tonumber(vmdkalloc_gb)|eval z = y/x| table x,y,z

0 Karma

Vijeta
Influencer

can you share your events and what fields are you trying to parse.

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...