Splunk Search

help with eval command

super_saiyan
Communicator

Hi everyone, i want to use the below command in a single line. i have tried "comma" but it's not working.

How do i do it?

|eval comments= if(Action="create","something has been created",'comments')
|eval comments= if(Action="delete","something  has been deleted",'comments')


Thanks.

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @super_saiyan,

yes sorry!

| eval comments= if(Action="create","something has been created", if(Action="delete","something  has been deleted",'comments'))

does it run and solves your need?

Ciao.

Giuseppe

View solution in original post

somesoni2
Revered Legend

Use the case command, like this

|eval comments= case(Action="create","something has been created", Action="delete","something  has been deleted", true(),'comments')

The option "true()" is for default option (when all preceding conditions do not match).

gcusello
SplunkTrust
SplunkTrust

Hi @super_saiyan,

use two concatenated ifs:

| eval comments= if(Action="create","something has been created", if(Action="delete","something  has been deleted",'comments')

or case with the same logic

Ciao.

Giuseppe

super_saiyan
Communicator

There is a closing bracket " ) " missing in the SPL.
is it supposed to be that way ? 
@gcusello 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @super_saiyan,

yes sorry!

| eval comments= if(Action="create","something has been created", if(Action="delete","something  has been deleted",'comments'))

does it run and solves your need?

Ciao.

Giuseppe

super_saiyan
Communicator

Yes, It ran and solved my issue. Thank you so much as always.
@gcusello 

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...