<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Changing an ID to a name in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579608#M201964</link>
    <description>&lt;P&gt;Have you tried additional SPL commands (following a |)?&lt;/P&gt;&lt;P&gt;Are you searching in Verbose Mode?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Dec 2021 15:21:00 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2021-12-30T15:21:00Z</dc:date>
    <item>
      <title>Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579192#M201839</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;My search result brings back a GUID in the ID field. The GUID refers to a customer. I would like it to reflect the customers name. Can I make a Splunk search do this every time?&lt;/P&gt;&lt;P&gt;Best wishes&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 15:56:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579192#M201839</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-23T15:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579193#M201840</link>
      <description>&lt;P&gt;Assuming the customer name is not available in another field, create a lookup table that maps GUID to name then make the lookup in your query.&lt;/P&gt;&lt;P&gt;If the lookup (I'll all it "guid2name.csv") looks like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;GUID     Name
8a400b04-51f0-4c70-9340-cc7b9964e5ed  Foo
bab2f4c4-5278-4a52-a65c-8c8a287a7726  Bar&lt;/LI-CODE&gt;&lt;P&gt;A query might look like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your search for ID&amp;gt;
| lookup guid2name.csv GUID as ID OUTPUT Name
...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 16:15:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579193#M201840</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-23T16:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579448#M201918</link>
      <description>&lt;P&gt;Thanks for the reply. That has worked well. I was hoping it would replace the field in all searches, but I have managed to get it to work with this search&lt;/P&gt;&lt;P&gt;index="sophos_central" "Event::Endpoint::Application::Detected" | lookup sub_estate_lookups.csv customer_id OUTPUT Name | table name, endpoint_type, location, when, customer_id sub_estate, group&lt;/P&gt;&lt;P&gt;Is it possible to replace the field by default whenever it is found?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 10:54:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579448#M201918</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-29T10:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579453#M201923</link>
      <description>&lt;P&gt;I have made some progress. I have setup an Automatic Lookup and this works on a search that I table, but not on a raw search. Is that the best I will get?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 11:36:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579453#M201923</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-29T11:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579463#M201925</link>
      <description>&lt;P&gt;Using an automatic lookup was a good idea.&amp;nbsp; I don't understand what you mean by "raw search", however.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 13:18:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579463#M201925</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-29T13:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579466#M201926</link>
      <description>&lt;P&gt;If I make a Table the Automatic Lookup works. If I do a search for index="sophos_central" I see what I would call the raw data and that field is still the GUI.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 13:25:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579466#M201926</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-29T13:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579487#M201928</link>
      <description>&lt;P&gt;Have you tried adding commands other than table after "index=sophos_central"?&amp;nbsp; Do any of them trigger the automatic lookup?&amp;nbsp; Do you see any error messages in the search log or in splunkd.log?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 15:00:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579487#M201928</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-29T15:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579569#M201955</link>
      <description>&lt;P&gt;I ran this search&lt;/P&gt;&lt;P&gt;index="sophos_central" "Event::Endpoint::Application::Detected"&lt;/P&gt;&lt;P&gt;and got the following result. This is the customer_id I wanted to change&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2021-12-30 at 09.55.58.png" style="width: 200px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17366i6090502093550541/image-size/small?v=v2&amp;amp;px=200" role="button" title="Screenshot 2021-12-30 at 09.55.58.png" alt="Screenshot 2021-12-30 at 09.55.58.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;index=_internal sourcetype=splunkd didn't seem to show any errors&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 09:58:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579569#M201955</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-30T09:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579608#M201964</link>
      <description>&lt;P&gt;Have you tried additional SPL commands (following a |)?&lt;/P&gt;&lt;P&gt;Are you searching in Verbose Mode?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 15:21:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579608#M201964</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-30T15:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Changing an ID to a name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579669#M201981</link>
      <description>&lt;P&gt;I think I have made some progress.&lt;/P&gt;&lt;P&gt;index="sophos_central" "Event::Endpoint::Application::Detected" | table name, endpoint_type, location, when, customer_id, sub_estate, group&lt;/P&gt;&lt;P&gt;That search gives me this which is correct.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2021-12-31 at 09.16.02.gif" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17386iF7999FFF844A4A91/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2021-12-31 at 09.16.02.gif" alt="Screenshot 2021-12-31 at 09.16.02.gif" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have now realised that I can add the sub_estate field from the Interesting Fields to the Selected Fields and that does what I want it to do. I can now see the sub_estate in every search.&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Dec 2021 09:23:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Changing-an-ID-to-a-name/m-p/579669#M201981</guid>
      <dc:creator>bazcurtis178</dc:creator>
      <dc:date>2021-12-31T09:23:38Z</dc:date>
    </item>
  </channel>
</rss>

