...ield) is max. How can I use eval in stats to have this? something like this: | stats values(eval(title4 where value is max)) AS title4 BY title1 How can I do it? Ciao....
When using regex how can I take a field formatted as "0012-4250" and only show the 1st and lat 3 digits? I tried the following in which maintains the original output:
| eval AcctCode = replace(A...
Hello,
Anyone knows if we can use eval-ingest with lookup command in Splunk Cloud?
The problem is that in Splunk Cloud we can only add configuration via custom app in SH.
Eval-ingest in g...
...ucket
| eval Derived_Status_Code=
case(
status_code>=199 and status_code<300,"Success",
status_code>=499,"Errors",
1=1,"Others" ``` I do not need anything that is not in the above c...
...irectly in the search. I'm aware that the syntax I'm using here with eval is not the one specified in the documentation, but I'm using it to simulate the calculated field (and it yields the same r...
...ndex_1 , index_2 , index_3 Based on the selected index, I am trying to run the splunk query: index="index_1"
| eval hostname_pattern=case(
index == "index_1","*-hostname_1",
index == "i...
Howdy, I'm building out some alerting in Splunk ES, and created a new correlation search. That is all working, but I'm unable to pass my eval as a value into email alert. What I have: | eval a...
...og a and log b without doing a subsearch, so far I have
index=a, env=a, account=a ("There is a file" OR "The file has been found")|field filename from log b | field filename2| eval Endtime = _...