<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365765#M107863</link>
    <description>&lt;P&gt;so...&lt;/P&gt;

&lt;P&gt;10  =  10  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  12  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  8  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  18  =  WARNING&lt;/P&gt;

&lt;P&gt;10  =  3  =  WARNING&lt;/P&gt;</description>
    <pubDate>Tue, 20 Mar 2018 15:56:56 GMT</pubDate>
    <dc:creator>Derben</dc:creator>
    <dc:date>2018-03-20T15:56:56Z</dc:date>
    <item>
      <title>How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365760#M107858</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;

&lt;P&gt;I'm trying to compare two panels to see if there are any changes in the count.  Both panels should be equal but if it changes (allowing a count of plus/minus 5 for catch up) then notify in another panel, i.e.&lt;/P&gt;

&lt;P&gt;If both panels have the same count then display GOOD in third panel.&lt;BR /&gt;
If numbers differ, then display WARNING in same third panel as above.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1st Panel search string...
index="file1" type=input" | stats count

2nd Panel search string...
index="file2" type="output" | stats count 

3rd Panel ?????...
compare   index="file1" type=input" | stats count   with   index="file2" type="output" | stats count   if   difference is greater or less than 5 then echo WARNING   otherwise   GOOD
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm struggling with the 3rd panel and have completely lost count of the variations I have tried but the logic is above.&lt;BR /&gt;&lt;BR /&gt;
,Hello.&lt;/P&gt;

&lt;P&gt;I'm trying to compare two panels to see if there are any changes in the count.  Both panels should be equal but if it changes (allowing a count of plus/minus 5 for catch up) then notify in another panel, i.e.&lt;/P&gt;

&lt;P&gt;If both panels have the same count then display GOOD in third panel.&lt;BR /&gt;
If numbers differ, then display WARNING in same third panel as above.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1st Panel search string...
index="file1" type=input" | stats count

2nd Panel search string...
index="file2" type="output" | stats count 

3rd Panel search string...
compare   index="file1" type=input" | stats count   with   index="file2" type="output" | stats count   if   difference is greater or less than 5 then echo WARNING   otherwise   GOOD
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm struggling with the 3rd panel and have completely lost count of the variations I have tried but the logic is above.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 14:31:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365760#M107858</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-20T14:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365761#M107859</link>
      <description>&lt;P&gt;You can have base search and refer that in other panels. Something like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;query&amp;gt;
  index="file1" type=input" | stats count as Count1 by _time | join _time type=left [index="file2" type="output" | stats count as Count2 by _time]
&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;0&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;&amp;lt;/latest&amp;gt;




 &amp;lt;panel&amp;gt;
  &amp;lt;chart&amp;gt;
    &amp;lt;title&amp;gt;Panel 1&amp;lt;/title&amp;gt;
    &amp;lt;search base="base_search"&amp;gt;
      &amp;lt;query&amp;gt;| fields Count1&amp;lt;/query&amp;gt;
      &amp;lt;earliest&amp;gt;0&amp;lt;/earliest&amp;gt;
      &amp;lt;latest&amp;gt;&amp;lt;/latest&amp;gt;
    &amp;lt;/search&amp;gt;



&amp;lt;panel&amp;gt;
  &amp;lt;chart&amp;gt;
    &amp;lt;title&amp;gt;Panel 2&amp;lt;/title&amp;gt;
    &amp;lt;search base="base_search"&amp;gt;
      &amp;lt;query&amp;gt;| fields Count2&amp;lt;/query&amp;gt;
      &amp;lt;earliest&amp;gt;0&amp;lt;/earliest&amp;gt;
      &amp;lt;latest&amp;gt;&amp;lt;/latest&amp;gt;
    &amp;lt;/search&amp;gt;



&amp;lt;panel&amp;gt;
  &amp;lt;chart&amp;gt;
    &amp;lt;title&amp;gt;Panel 3&amp;lt;/title&amp;gt;
    &amp;lt;search base="base_search"&amp;gt;
      &amp;lt;query&amp;gt;| eval Field3=case((Count1-Count2)=5,"GOOD","WARNING") | fields Field3&amp;lt;/query&amp;gt;
      &amp;lt;earliest&amp;gt;0&amp;lt;/earliest&amp;gt;
      &amp;lt;latest&amp;gt;&amp;lt;/latest&amp;gt;
    &amp;lt;/search&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 20 Mar 2018 15:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365761#M107859</guid>
      <dc:creator>strive</dc:creator>
      <dc:date>2018-03-20T15:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365762#M107860</link>
      <description>&lt;P&gt;Are you sure that Count1-Count2=5 then Good else WARNING?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 15:19:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365762#M107860</guid>
      <dc:creator>strive</dc:creator>
      <dc:date>2018-03-20T15:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365763#M107861</link>
      <description>&lt;P&gt;OR you can also take the search like this for 3rd panel&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index="file1" type=input" | stats count as Count1 by _time | join _time type=left [index="file2" type="output" | stats count as Count2 by _time] | eval Field3=case((Count1-Count2)=5,"GOOD","WARNING") | fields Field3&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 15:20:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365763#M107861</guid>
      <dc:creator>strive</dc:creator>
      <dc:date>2018-03-20T15:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365764#M107862</link>
      <description>&lt;P&gt;Count1 should equal Count2  -  there may be times when the difference is out by plus or minus 5 which is acceptable.   If it's anymore than that, then it's a WARNING.  Hope that makes sense  &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 15:54:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365764#M107862</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-20T15:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365765#M107863</link>
      <description>&lt;P&gt;so...&lt;/P&gt;

&lt;P&gt;10  =  10  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  12  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  8  =  GOOD&lt;/P&gt;

&lt;P&gt;10  =  18  =  WARNING&lt;/P&gt;

&lt;P&gt;10  =  3  =  WARNING&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 15:56:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365765#M107863</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-20T15:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365766#M107864</link>
      <description>&lt;P&gt;I can never get the join to work.  Tried it in other queries with little success - " Search Factory: Unknown search command 'index' "  My searches look the same as yours but I'm obviously doing something wrong  &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 16:28:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365766#M107864</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-20T16:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365767#M107865</link>
      <description>&lt;P&gt;Try this out for your third panel..&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;(index="file1" type="input") OR (index="file2" type="output")&lt;BR /&gt;
| stats count(eval(type="input")) as input, count(eval(type="output")) as output&lt;BR /&gt;
| eval result=if(input==output, "GOOD", "WARNING")&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 18:58:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365767#M107865</guid>
      <dc:creator>jluo_splunk</dc:creator>
      <dc:date>2018-03-20T18:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365768#M107866</link>
      <description>&lt;P&gt;@Derben, Since your first two panels are single value results &lt;CODE&gt;| stats count&lt;/CODE&gt;. You can use &lt;CODE&gt;&amp;lt;search&amp;gt;&lt;/CODE&gt; Event Handler to set the results of first two panels as tokens and then use them in the third panel. Similar to one of my older answers: &lt;A href="https://answers.splunk.com/answers/580233/use-values-from-two-panels-in-a-third-panel.html"&gt;https://answers.splunk.com/answers/580233/use-values-from-two-panels-in-a-third-panel.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Please find below a run anywhere example which has dummy searches with Input and Output count set via text box for testing. You can replace the two panel searches with your own search. (PS: Also for testing I have a hidden time input using &lt;CODE&gt;depends="$alwaysHideDefaultTimeForDemo$"&lt;/CODE&gt; since dummy makeresults command does not need time I have set it to Last 1 second).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;form&amp;gt;
  &amp;lt;label&amp;gt;Compare two panels and show result in third&amp;lt;/label&amp;gt;
  &amp;lt;fieldset submitButton="false"&amp;gt;
    &amp;lt;input type="time" token="tokTime" searchWhenChanged="true" depends="$alwaysHideDefaultTimeForDemo$"&amp;gt;
      &amp;lt;label&amp;gt;Time (default value)&amp;lt;/label&amp;gt;
      &amp;lt;default&amp;gt;
        &amp;lt;earliest&amp;gt;-1s@s&amp;lt;/earliest&amp;gt;
        &amp;lt;latest&amp;gt;now&amp;lt;/latest&amp;gt;
      &amp;lt;/default&amp;gt;
    &amp;lt;/input&amp;gt;
  &amp;lt;/fieldset&amp;gt;
  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Input&amp;lt;/title&amp;gt;
      &amp;lt;input type="text" token="tokInput" searchWhenChanged="true"&amp;gt;
        &amp;lt;label&amp;gt;Enter Input count for testing&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;10&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;single&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;| makeresults 
| fields - _time 
| eval count=$tokInput$&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;!-- Your First Query Goes Here--&amp;gt;
        &amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
      &amp;lt;/single&amp;gt;
    &amp;lt;/panel&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Output&amp;lt;/title&amp;gt;
      &amp;lt;input type="text" token="tokOutput" searchWhenChanged="true"&amp;gt;
        &amp;lt;label&amp;gt;Enter Output count for testing&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;4&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;single&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;| makeresults 
| fields - _time 
| eval count=$tokOutput$&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
      &amp;lt;/single&amp;gt;
    &amp;lt;/panel&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Result&amp;lt;/title&amp;gt;
      &amp;lt;table&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;| makeresults 
| fields - _time 
| eval message=if($tokInput$&amp;gt;=$tokOutput$,$tokInput$-$tokOutput$,$tokOutput$-$tokInput$)
| eval message=if(message&amp;gt;5,"WARNING","GOOD")&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;!-- No changes required for this query --&amp;gt;
        &amp;lt;option name="count"&amp;gt;10&amp;lt;/option&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
        &amp;lt;format type="color" field="message"&amp;gt;
          &amp;lt;colorPalette type="map"&amp;gt;{"GOOD":#65A637,"WARNING":#D93F3C}&amp;lt;/colorPalette&amp;gt;
        &amp;lt;/format&amp;gt;
      &amp;lt;/table&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
&amp;lt;/form&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;While the simple XML I have provided is for results to be displayed in third panel via a Table with Color ranges, you can get &lt;A href="https://splunkbase.splunk.com/app/3119/"&gt;Status Indicator Custom Visualization&lt;/A&gt; which can display the same with Color Icon and Text message. Following is code for third panel in case you have Status Indicator Custom Visualization available.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/4576i1B0D696D12450253/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Result&amp;lt;/title&amp;gt;
      &amp;lt;viz type="status_indicator_app.status_indicator"&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;| makeresults 
| fields - _time 
| eval diff=if($tokInput$&amp;gt;=$tokOutput$,$tokInput$-$tokOutput$,$tokOutput$-$tokInput$)
| eval message=if(diff&amp;gt;5,"WARNING","GOOD")
| eval icon=if(diff&amp;gt;5,"times-circle","info-circle")
| eval color=if(diff&amp;gt;5,"red","green")
| table message icon color&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;!-- No changes required for this query --&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.colorBy"&amp;gt;field_value&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.fillTarget"&amp;gt;background&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.fixIcon"&amp;gt;warning&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.icon"&amp;gt;field_value&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.precision"&amp;gt;0&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.showOption"&amp;gt;1&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.staticColor"&amp;gt;#555&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.useColors"&amp;gt;true&amp;lt;/option&amp;gt;
        &amp;lt;option name="status_indicator_app.status_indicator.useThousandSeparator"&amp;gt;true&amp;lt;/option&amp;gt;
      &amp;lt;/viz&amp;gt;
    &amp;lt;/panel&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 20 Mar 2018 19:41:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365768#M107866</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-03-20T19:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365769#M107867</link>
      <description>&lt;P&gt;Brilliant.  Thanks for all your help. We've now got it looking like we wanted.  The only outstanding issue we have is that we'd like the query result to appear in relevant colour.  It's no a number output, just text, therefore the word GOOD should be GREEN.&lt;/P&gt;

&lt;P&gt;I've tried the suggestion above...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;      &amp;lt;colorPalette type="map"&amp;gt;{"GOOD":#65A637,"WARNING":#D93F3C}&amp;lt;/colorPalette&amp;gt;
  &amp;lt;/format&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but it just brings back a warning so I'm obvs doing something wrong.  Is there not an easy way of changing the colour of character results?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 11:18:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365769#M107867</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-22T11:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365770#M107868</link>
      <description>&lt;P&gt;@Derben, you can edit directly from UI and and &lt;CODE&gt;Color by Value &amp;gt; Define Rules&lt;/CODE&gt; to color based on values in the table. Besides color have you verified whether both the values &lt;CODE&gt;GOOD&lt;/CODE&gt; and &lt;CODE&gt;WARNING&lt;/CODE&gt; are being displayed in table as per your input and output count?&lt;/P&gt;

&lt;P&gt;I hope you are on Splunk 6.5 or higher.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:31:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365770#M107868</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-03-22T16:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two fields and result in a 'pass' or 'fail' in another field (give or take a count of 5)?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365771#M107869</link>
      <description>&lt;P&gt;We're on v7  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  But I can't find that option.  I thought only numeric values are changeable?  My visualization is 'single value' but using words 'good' 'caution' and 'warning'  &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:59:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-fields-and-result-in-a-pass-or-fail-in/m-p/365771#M107869</guid>
      <dc:creator>Derben</dc:creator>
      <dc:date>2018-03-22T16:59:16Z</dc:date>
    </item>
  </channel>
</rss>

