<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Eval Equals Another Field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421450#M121039</link>
    <description>&lt;P&gt;Greetings,&lt;/P&gt;

&lt;P&gt;I have a query that ends with a timechart command&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| timechart span=1h eval(round(avg(FIELD),0)) as "Response" by source_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Previously, I created thresholds for my timechart by using eval&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval Normal = 500
| eval High = 1000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, as my number of source_types grew, I could no longer utilize the same thresholds.  I've created a lookup that contains the necessary thresholds for each specific source_type, and I can see the new field created in the fields column on the left hand side of the screen.  However, I'm having trouble adding this new field or setting this new field as its intended threshold delimiter.&lt;/P&gt;

&lt;P&gt;So how can create a timechart (which I have to keep/utilize) and incorporate my thresholds from my lookup?&lt;/P&gt;

&lt;P&gt;The final output would look similar to this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time              Source_Type     Normal          High
3/3/19             ABC               500             1000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 23:33:38 GMT</pubDate>
    <dc:creator>cquinney</dc:creator>
    <dc:date>2020-09-29T23:33:38Z</dc:date>
    <item>
      <title>Eval Equals Another Field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421450#M121039</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;

&lt;P&gt;I have a query that ends with a timechart command&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| timechart span=1h eval(round(avg(FIELD),0)) as "Response" by source_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Previously, I created thresholds for my timechart by using eval&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval Normal = 500
| eval High = 1000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, as my number of source_types grew, I could no longer utilize the same thresholds.  I've created a lookup that contains the necessary thresholds for each specific source_type, and I can see the new field created in the fields column on the left hand side of the screen.  However, I'm having trouble adding this new field or setting this new field as its intended threshold delimiter.&lt;/P&gt;

&lt;P&gt;So how can create a timechart (which I have to keep/utilize) and incorporate my thresholds from my lookup?&lt;/P&gt;

&lt;P&gt;The final output would look similar to this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time              Source_Type     Normal          High
3/3/19             ABC               500             1000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:33:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421450#M121039</guid>
      <dc:creator>cquinney</dc:creator>
      <dc:date>2020-09-29T23:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Eval Equals Another Field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421451#M121040</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | timechart span=1h eval(round(avg(FIELD),0)) AS Response BY Source_Type
| untable _time sourcetype count
| lookup MyThresholdLookup Source_Type
...
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 05 Mar 2019 03:26:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421451#M121040</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-05T03:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Eval Equals Another Field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421452#M121041</link>
      <description>&lt;P&gt;Thank you for suggestion but it didn't give the outcome I need.  Do you know of a way to to create a new field based on another field or from the lookup?&lt;/P&gt;

&lt;P&gt;|  eval  Normal=Lookup.csv Normal&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 03:40:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421452#M121041</guid>
      <dc:creator>cquinney</dc:creator>
      <dc:date>2019-03-05T03:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: Eval Equals Another Field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421453#M121042</link>
      <description>&lt;P&gt;Let's start over.  Show me:&lt;BR /&gt;
1: A few raw events&lt;BR /&gt;
2: Your full search (all of it)&lt;BR /&gt;
3: Your current output&lt;BR /&gt;
4: The first 2 lines of your &lt;CODE&gt;Lookup.csv&lt;/CODE&gt; file&lt;BR /&gt;
5: A mockup of your desired output&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 03:50:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-Equals-Another-Field/m-p/421453#M121042</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-05T03:50:18Z</dc:date>
    </item>
  </channel>
</rss>

