Splunk Search

How can I replace that field values to another and vice versa?

saivardhan
New Member

For example, my account number is coming as device number and vice versa and that is expected based on the condition I have in my search. But if I meet another condition, I would like to swap back the values.

| eval statsType = if ((like(name, "other"), | streamstats current=t values(device) as account, values(account) as device))

Device and account are the fields I would like to swap values.

Thanks in advance.

0 Karma

somesoni2
Revered Legend

About query is super confusing. If all three fields (device, account and name) are on the same row and you want to manipulate them based on value on current row only, you could do like this

your current search
| eval temp1=device | eval temp2=account 
| eval device=if(like(name,"other"), temp2,temp1)
| eval account=if(like(name,"other"), temp1,temp2) 
| fields - temp1 temp2
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...