<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to include additional field from inputlookup in results? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65710#M16306</link>
    <description>&lt;P&gt;I have a similar issue however I'm using a dnslookup. I've tried a few variations however, i can't seem to get the dnslookup result to appear on the table. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=xxx sourcetype="WinEventLog:Security" "EventCode=644" OR "EventCode=4740"  
| eval Win2K8_acc= mvindex(Account_Name,1)  
| eval "Locked_Account"=coalesce(Win2K8_acc,Target_Account_Name) 
| dnslookup forward ComputerName Client_Address 
| table account_domain account_name ComputerName Caller_Computer_Name Client_Address
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In the above example, the "Client_Address" field is ooming up blank. Any ideas? thanks in advance!&lt;/P&gt;</description>
    <pubDate>Thu, 21 Aug 2014 22:44:30 GMT</pubDate>
    <dc:creator>sadkha</dc:creator>
    <dc:date>2014-08-21T22:44:30Z</dc:date>
    <item>
      <title>How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65706#M16302</link>
      <description>&lt;P&gt;Currently i am populating my summary index with a list of malware listed ips with&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=blah OR index=blah2 OR index=blah3 NOT uri="/dot_clear.gif"  [ | inputlookup watchlist_ip_lookup  
    | rename watch_ip as clientip | fields + clientip ] 
| dedup clientip 
| lookup ga ip as clientip 
| table date_month, date_mday, date_hour, date_minute, date_year, clientip, country, org, status, referer, uri, host, source, sourcetype, index, other
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the inputlookup watchlist_ip_lookup.csv file has two columns, the watch_type is optional as sometimes it's blank&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; watch_ip, watch_type
    2.187.19.0, C2
    49.244.116.184,
    46.63.167.216, C2
    .... etc
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How would i include the watch_type field in all the results for my summary index?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:28:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65706#M16302</guid>
      <dc:creator>sonicZ</dc:creator>
      <dc:date>2020-09-28T12:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65707#M16303</link>
      <description>&lt;P&gt;Will this work?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=blah OR index=blah2 OR index=blah3 NOT uri="/dot_clear.gif"  [ | inputlookup watchlist_ip_lookup  
    | rename watch_ip as clientip | fields + clientip ] 
| dedup clientip 
| lookup ga ip as clientip 
| lookup watchlist_ip_lookup watch_ip as clientip OUTPUT watch_type 
| table date_month, date_mday, date_hour, date_minute, date_year, clientip, country, org, status, referer, uri, host, source, sourcetype, index, other, watch_type
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 20 Sep 2012 05:07:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65707#M16303</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-09-20T05:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65708#M16304</link>
      <description>&lt;P&gt;Awesome thanks Lisa, that outer lookup was the trick. Its pulling up the extra field from the lookup now.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2012 16:05:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65708#M16304</guid>
      <dc:creator>sonicZ</dc:creator>
      <dc:date>2012-09-20T16:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65709#M16305</link>
      <description>&lt;P&gt;I was looking for a similar output and the above search worked. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 10:49:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65709#M16305</guid>
      <dc:creator>santhosh2kece</dc:creator>
      <dc:date>2014-05-06T10:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65710#M16306</link>
      <description>&lt;P&gt;I have a similar issue however I'm using a dnslookup. I've tried a few variations however, i can't seem to get the dnslookup result to appear on the table. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=xxx sourcetype="WinEventLog:Security" "EventCode=644" OR "EventCode=4740"  
| eval Win2K8_acc= mvindex(Account_Name,1)  
| eval "Locked_Account"=coalesce(Win2K8_acc,Target_Account_Name) 
| dnslookup forward ComputerName Client_Address 
| table account_domain account_name ComputerName Caller_Computer_Name Client_Address
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In the above example, the "Client_Address" field is ooming up blank. Any ideas? thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 22:44:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65710#M16306</guid>
      <dc:creator>sadkha</dc:creator>
      <dc:date>2014-08-21T22:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to include additional field from inputlookup in results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65711#M16307</link>
      <description>&lt;P&gt;@sadkha - the syntax is wrong for your lookup in the fourth line. Here is a link to the &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.0/SearchReference/Lookup"&gt;lookup command&lt;/A&gt;. So I think that what you want might be:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | lookup dnslookup  clientip as Client_Address  OUTPUT clienthost as ComputerName 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But I am not sure that I know what your field names are...&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 01:53:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-include-additional-field-from-inputlookup-in-results/m-p/65711#M16307</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-10-04T01:53:35Z</dc:date>
    </item>
  </channel>
</rss>

