Hi,
I'm trying out the new HTTP Event Collector, but I'm having problems searching the data.
Basically, the raw data looks like this:
{"user":"Louie","task":{"description":"HTTPSplunking 3","code":123},"duration":1800,"finish_time":1443535112}
And there are several similar events for Huey, Dewey and Louie. In the search, Splunk correctly identifies the varous task.code and task.description fields. Nice! task.code is always a number. However, my problems are that I want to use eval to concatenate user and task.code , but in that context, task.code does not seem to have any value.
For example:
... task.description="HTTPSplunking*" |eval usertask=user + ":" +tostring(task.code)
results in usertask having the values "Huey:Null", "Dewey:Null", "Louie:Null" . If I omit tostring() , then usertask does not get any value at all. Same thing if I use task.description instead.
So I tried
|eval task_code_null=if(isnull(task.code),"yes","no")
and task_code_null is always "yes" . BUT, stats is able to calculate sum(task.code) so it does not seem completely null.
Does anyone else have this problem? Bug or feature?
... View more