<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Compare values from log and lookup in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503345#M140036</link>
    <description>&lt;PRE&gt;&lt;CODE&gt;| makeresults
| eval ip="10.10.10.9,10.10.10.10,10.10.10.11,10.10.10.12,10.10.10.13"
| eval port="8,8,8,8,8"
| makemv delim="," ip
| makemv delim="," port
| eval tmp=mvzip(ip,port)
| mvexpand tmp
| rex field=tmp "(?&amp;lt;IP&amp;gt;[^,]+),(?&amp;lt;Port&amp;gt;[^,]+)"
| fields IP,Port
| join IP Port
 [| stats count
| eval _raw="service_name, IP, Port
HTTPS,10.10.10.10,443
DNS,10.10.10.11,8"
| multikv forceheader=1
| fields - _*
| fields service_name IP Port]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi, this is sample query.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your search query
| join destip destport [| inputlookup service_lookup
| rename IP as destip
| rename Port as destport]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How about this?&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2019 06:13:48 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2019-10-23T06:13:48Z</dc:date>
    <item>
      <title>Compare values from log and lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503344#M140035</link>
      <description>&lt;P&gt;I have a lookup table that contains the data similar to the:&lt;BR /&gt;
&lt;CODE&gt;Service_name, IP, Port&lt;BR /&gt;
HTTPS, 10.10.10.10, 443&lt;BR /&gt;
DNS, 10.10.10.11, 80&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;What I am trying to achieve is to make a search that'll compare existing IPs and ports from the logs that are in fields &lt;CODE&gt;destip, destport&lt;/CODE&gt; and return values that match both, i.e. &lt;CODE&gt;if "destip = IP &amp;amp; destport = Port then return service_name&lt;/CODE&gt; but I don't know how to achieve this in SPL.&lt;/P&gt;

&lt;P&gt;I can match destip with the IP from the lookup and return a new field for service_name based on that but that doesn't help me achieve what I need&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| lookup service_lookup IP AS destip OUTPUTNEW service_name&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 05:12:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503344#M140035</guid>
      <dc:creator>ialahdal</dc:creator>
      <dc:date>2019-10-23T05:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: Compare values from log and lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503345#M140036</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| makeresults
| eval ip="10.10.10.9,10.10.10.10,10.10.10.11,10.10.10.12,10.10.10.13"
| eval port="8,8,8,8,8"
| makemv delim="," ip
| makemv delim="," port
| eval tmp=mvzip(ip,port)
| mvexpand tmp
| rex field=tmp "(?&amp;lt;IP&amp;gt;[^,]+),(?&amp;lt;Port&amp;gt;[^,]+)"
| fields IP,Port
| join IP Port
 [| stats count
| eval _raw="service_name, IP, Port
HTTPS,10.10.10.10,443
DNS,10.10.10.11,8"
| multikv forceheader=1
| fields - _*
| fields service_name IP Port]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi, this is sample query.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your search query
| join destip destport [| inputlookup service_lookup
| rename IP as destip
| rename Port as destport]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How about this?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 06:13:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503345#M140036</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-10-23T06:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Compare values from log and lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503346#M140037</link>
      <description>&lt;P&gt;I was able to get what I wanted off of what you had here, eventually even decreased the search query to &lt;CODE&gt;| lookup service_lookup IP as destip Port as destport OUTPUTNEW service_name&lt;/CODE&gt;&lt;BR /&gt;
Which matched the port &amp;amp; ip from the logs to the table and then created a new field named "service_name" based on the results.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 08:08:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503346#M140037</guid>
      <dc:creator>ialahdal</dc:creator>
      <dc:date>2019-10-23T08:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Compare values from log and lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503347#M140038</link>
      <description>&lt;P&gt;So that's it.&lt;BR /&gt;
It will be helpful. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 08:38:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compare-values-from-log-and-lookup/m-p/503347#M140038</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-10-23T08:38:52Z</dc:date>
    </item>
  </channel>
</rss>

