Splunk Search

eval a new field base on a search result

gfs2277
New Member

hey ninjas,

i have a search result like the following:

error_code1 42
error_code2 55
error_code3 62
error_code4 17

i want to append a colum at the right side
the value of the colum is base on a search result ( such as index=nijia | stats count)
i expect it to looked like the this:

error_code1 42 100
error_code2 55 100
error_code3 62 100
error_code4 17 100

i think i should use "eval" to get the new colum , but i do not know how to eval a new field base on a search result
do you have any ideas?

Tags (2)
0 Karma

landen99
Motivator

Here are a couple of other options:

| appendcol [subsearch]

as well, but this will only match the values line by line in the order that the results appear from the subsearch. Or you could use

| join field1 [subsearch]

to match the results to the base search as they match on field1.

tpask
Engager

| appendcols [ search .... ] works

0 Karma

somesoni2
Revered Legend
Your base search giving error_code, count | eval newCol=[ search index=ninja |stats count | return $count]
0 Karma

ruman_splunk
Splunk Employee
Splunk Employee

This didn't work for me, but this did:

| eval [ | rest splunk_server=local /services/server/info | return host ]
0 Karma

MuS
Legend
0 Karma

gfs2277
New Member

please note the search ( what the eval base on ) just return single value ( not multi-row )
so appendcols will not works in this case

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...