Splunk Search

Can anyone help me understand this eval search query?

hastym
Explorer

I have recently started a new role and have been tasked with figuring out some old reports. The creator of the reports no longer works here so isn't available for a knowledge transfer. There is one piece of syntax which is repeated a couple of times that I can not figure out what it does.

Eval fieldX - {fieldY} = fieldX

I have read through the documentation but can't find anything specific to this syntax. If someone can point me towards relevant documentation or can explain this to me that would be appreciated.

Tags (2)
0 Karma
1 Solution

acharlieh
Influencer

As written that eval would not work, as you need a single assignment on the left hand side (EDIT: Actually I'm wrong on that first sentence that syntax could work... it's making a prefixed field using the values of the bracketed field(s) ) ... but if you saw @alacercogitatus at a number of previous confs give his "Lesser Known Search Commands" talk, he actually covers this syntax... basically it takes the value of the field, and inserts that into the calculation...

For the most simplistic example I can think of here...

| makeresults count=2 | streamstats count | eval {count}="foo"

This search creates two results... the first result has fields count=1 and 1="foo" whereas the second has count=2 and 2="foo"

This is actually very useful when you need to do transforms on multiple dimensions of key value pairs where xyseries can't help... for example:

| makeresults count=8 | streamstats count | eval type=if(count%2==0,"X","Y"),app=if(count%4<2,"A","B"), class=if(count<=4,"F","G") | rename count -> value 

If the above produces your data set, where you have values of types X and Y for multiple apps and multiple classes... and you want to rll up those values by app and class pairs....

... | eval {type}=value | fields - type, value | stats values(*) as * by app,class

View solution in original post

acharlieh
Influencer

As written that eval would not work, as you need a single assignment on the left hand side (EDIT: Actually I'm wrong on that first sentence that syntax could work... it's making a prefixed field using the values of the bracketed field(s) ) ... but if you saw @alacercogitatus at a number of previous confs give his "Lesser Known Search Commands" talk, he actually covers this syntax... basically it takes the value of the field, and inserts that into the calculation...

For the most simplistic example I can think of here...

| makeresults count=2 | streamstats count | eval {count}="foo"

This search creates two results... the first result has fields count=1 and 1="foo" whereas the second has count=2 and 2="foo"

This is actually very useful when you need to do transforms on multiple dimensions of key value pairs where xyseries can't help... for example:

| makeresults count=8 | streamstats count | eval type=if(count%2==0,"X","Y"),app=if(count%4<2,"A","B"), class=if(count<=4,"F","G") | rename count -> value 

If the above produces your data set, where you have values of types X and Y for multiple apps and multiple classes... and you want to rll up those values by app and class pairs....

... | eval {type}=value | fields - type, value | stats values(*) as * by app,class

hastym
Explorer

Thanks for the quick response @acharlieh. I have a grasp on the 'eval {count} = "foo"' kind of syntax.
I'm just confused as to what the syntax example I provided is doing.

Example:
fieldX is '12345'
fieldY is 'A'

what would be the result of the line:
Eval fieldX - {fieldY} = fieldX

0 Karma

acharlieh
Influencer

You should try it out yourself! The beautiful thing about makeresults and eval is that you can use them to make synthetic results to try things out on:

| makeresults | eval fieldX="12345",fieldY="A" | eval fieldX-{fieldY} = fieldX

hastym
Explorer

Great I never knew about that feature! Thanks for all the help @acharlieh

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...