Splunk Search

assign value from another eval param

eranhauser
Path Finder

How to assign the value of param name original to the source in the | collect statement
index=123 

| eval original=abcd,

 | collect index=qaz source=original

 

 

Labels (1)
0 Karma

eranhauser
Path Finder

Unfortunately it does not work. using sub search will change the query source value but not the collect one

0 Karma

PickleRick
SplunkTrust
SplunkTrust

More words please.

Subsearch is getting executed (and its results are substituted) where it's placed. So if you do

collect [...] sourcetype=[whatever subsearch you come up with]

It will work.

But that will give you one static value for the whole collect command.

If you want to dynamically assign the "destination" sourcetype per each event separately, you must use the hec format.

0 Karma

eranhauser
Path Finder

I edited my question. That works in two eval  parameters but not on the source parameter in the | collect

0 Karma

PickleRick
SplunkTrust
SplunkTrust

No. You can't do that. You need a constant parameter for the collect command. If you want to generate it dynamically, you need to do a subsearch from which you return the value of the parameter (the subsearch is executed before the main search).

Another option is to use the collect command with output_format=hec - then you can specify your metadata fields on a per-event basis but that's more complicated.

See https://docs.splunk.com/Documentation/Splunk/9.1.1/SearchReference/Collect

Collect is generally a relatively tricky command with some non-obvious restrictions (and uses your license if you use sourcetype different than the default stash one) so it's worth reading thoroughly the docs about it and test it on a dev environment before trying to run it in prod.

Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Like with a programming language (writing searches in SPL is a form of programming after all), the order of operations does matter.

So

| eval a=b,c=a

will yield different results than

| eval c=a,a=b

 

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...