<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: run different filter in an index search based on a condition in dropdown in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658479#M227450</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;STRONG&gt;The first search&lt;/STRONG&gt; does not work because ipv6 from the dropdown is in a &lt;U&gt;compressed format&lt;/U&gt; from a different data source, while the ipv6 in the index is in &lt;U&gt;not in a compressed format&lt;/U&gt;, so it has to go through a regex or function to convert it to a compressed format in &lt;STRONG&gt;the second search&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;Thank you for your help&lt;/P&gt;</description>
    <pubDate>Sat, 23 Sep 2023 13:23:11 GMT</pubDate>
    <dc:creator>LearningGuy</dc:creator>
    <dc:date>2023-09-23T13:23:11Z</dc:date>
    <item>
      <title>run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658464#M227444</link>
      <description>&lt;P&gt;Is it possible to run different filter in an index search based on a condition in dropdown below?&lt;BR /&gt;The second filter works for both ipv4 and ipv6, but it is slowing down the search.&amp;nbsp; I don't want ipv4 going through my filter for ipv6.&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;STRONG&gt;&lt;BR /&gt;If select IPv4&lt;/STRONG&gt;&lt;BR /&gt;dropdown box &amp;gt; select 1.1.1.1&lt;BR /&gt;ip_token=1.1.1.1&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Search:&lt;/STRONG&gt;&lt;BR /&gt;| index=vulnerability_index&lt;BR /&gt;ip="$ip_token$"&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;if select IPv6&lt;/STRONG&gt;&lt;BR /&gt;dropdown box &amp;gt; select&amp;nbsp; 2001:db8:3333:4444:5555:6666::2101&lt;BR /&gt;ip_token=2001:db8:3333:4444:5555:6666::2101&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Search:&lt;/STRONG&gt;&lt;BR /&gt;| index=vulnerability_index&lt;BR /&gt;| rex mode=sed field=ip "s/&amp;lt;regex&amp;gt;/&amp;lt;replacement&amp;gt;/&amp;lt;flags&amp;gt;"&lt;BR /&gt;| search ip="$ip_token$"&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 00:43:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658464#M227444</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-23T00:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658468#M227446</link>
      <description>&lt;P&gt;Maybe you can first answer the question why does the first search not satisfy your need? &amp;nbsp;In other words, what is that rex is supposed to accomplish? &amp;nbsp;If your data look like the following:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;_raw&lt;/TD&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;foo 1.1.1.1 bar&lt;/TD&gt;&lt;TD&gt;2023-09-23 00:44:01&lt;/TD&gt;&lt;TD&gt;1.1.1.1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;foo 2.2.2.2 bar&lt;/TD&gt;&lt;TD&gt;2023-09-23 00:44:01&lt;/TD&gt;&lt;TD&gt;2.2.2.2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;foo 2001:db8:3333:4444:5555:6666::2101 bar&lt;/TD&gt;&lt;TD&gt;2023-09-23 00:44:01&lt;/TD&gt;&lt;TD&gt;2001:db8:3333:4444:5555:6666::2101&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;foo 2001:db8:3333:4444:5555:6666::2102 bar&lt;/TD&gt;&lt;TD&gt;2023-09-23 00:44:01&lt;/TD&gt;&lt;TD&gt;2001:db8:3333:4444:5555:6666::2102&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="andale mono,times"&gt;ip="$ip_token$"&lt;/FONT&gt; should pick up the correct event whether $ip_token$ is 1.1.1.1 (IPv4) or&amp;nbsp;2001:db8:3333:4444:5555:6666::2101 (IPv6). &amp;nbsp;What am I missing here?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 07:49:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658468#M227446</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-23T07:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658479#M227450</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;STRONG&gt;The first search&lt;/STRONG&gt; does not work because ipv6 from the dropdown is in a &lt;U&gt;compressed format&lt;/U&gt; from a different data source, while the ipv6 in the index is in &lt;U&gt;not in a compressed format&lt;/U&gt;, so it has to go through a regex or function to convert it to a compressed format in &lt;STRONG&gt;the second search&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;Thank you for your help&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 13:23:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658479#M227450</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-23T13:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658484#M227453</link>
      <description>&lt;P&gt;Also remember that if you do manual extraction with the rex command and only then search on its results it will be much much slower than by simply searching the index because instead of finding the value in the index splunk has to pass every event through the regex extraction and only then find matching events.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 17:18:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658484#M227453</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-09-23T17:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658486#M227455</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I am using a regex because the ipv6 on the index is &lt;STRONG&gt;&lt;U&gt;not in compressed format&lt;/U&gt;&lt;/STRONG&gt;. The search with regex is slower than regular search, that is &lt;STRONG&gt;&lt;U&gt;the reason why I want to bypass the regex for ipv4&lt;/U&gt;&lt;/STRONG&gt;.&lt;BR /&gt;Please suggest.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 22:41:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658486#M227455</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-23T22:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658488#M227457</link>
      <description>&lt;P&gt;Ah, the same situation as you expressed in&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-perform-lookup-on-inconsistent-IPv6-format-in-CSV-file/m-p/657016#M226935" target="_blank" rel="noopener"&gt;Re: How to perform lookup on inconsistent IPv6 for...&lt;/A&gt;. &amp;nbsp;The solution is also the same: Use host CIDR expressions instead of host IP address in search. &amp;nbsp;This time, it is right in search command, no lookup required. (Absolutely no regex. &amp;nbsp;Always suppress your urge to manipulate structured data as string.) &amp;nbsp;See&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Search#CIDR_matching" target="_blank" rel="noopener"&gt;CIDR matching&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;So, instead of&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%"&gt;Instead of&lt;/TD&gt;&lt;TD width="50%"&gt;Use&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%"&gt;&lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;If select IPv4&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;&lt;SPAN&gt;dropdown box &amp;gt; select 1.1.1.1&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;&lt;SPAN&gt;ip_token="1.1.1.1"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD width="50%"&gt;&lt;STRONG&gt;If select IPv4&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;dropdown box &amp;gt; select 1.1.1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip_token="1.1.1.1&lt;STRONG&gt;/32&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%"&gt;&lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;if select IPv6&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;&lt;SPAN&gt;dropdown box &amp;gt; select&amp;nbsp; 2001:db8:3333:4444:5555:6666::2101&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;&lt;SPAN&gt;ip_token="2001:db8:3333:4444:5555:6666::2101"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD width="50%"&gt;&amp;nbsp;&lt;STRONG&gt;if select IPv6&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;dropdown box &amp;gt; select&amp;nbsp; 2001:db8:3333:4444:5555:6666::2101&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip_token="2001:db8:3333:4444:5555:6666::2101&lt;STRONG&gt;/128&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;You will be using the same efficient search for both no matter whether the address representation is compressed or not.&lt;/P&gt;&lt;P&gt;Let me guess your next question (because I did answered your follow-up IPv6 questions:-): the tokens are populated by a search, so you need to know which host bitmask to apply to which value. &amp;nbsp;Well, that answer was a hack on ipmask function:&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-perform-lookup-on-inconsistent-IPv6-format-in-CSV-file/m-p/657104/highlight/true#M226967" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-perform-lookup-on-inconsistent-IPv6-format-in-CSV-file/m-p/657104/highlight/true#M226967&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 23:39:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658488#M227457</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-23T23:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658503#M227460</link>
      <description>&lt;P&gt;Any way you do it, it _will_ be inefficient (that's the "beauty" of matching ipv6 addresses). In this case it probably would be best to use additional "external" mechanics if possible - maybe try to expand the addresses on ingest to index the full form and have it easier matchable on search later. Or at least add an indexed field with a flag to easily identify the fields having ipv6 field version.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2023 05:54:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658503#M227460</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-09-24T05:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658610#M227486</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Can you give an example how to implement your suggestion&lt;STRONG&gt;&lt;U&gt; in the search&lt;/U&gt;&lt;/STRONG&gt; with cidrmatch?&amp;nbsp;&lt;BR /&gt;Assume that the mask already added in the dropdown box.&amp;nbsp; Thank you for your help&lt;BR /&gt;&lt;SPAN&gt;ip_token=1.1.1.1&lt;/SPAN&gt;&lt;STRONG&gt;/32&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;ip_token=2001:db8:3333:4444:5555:6666::2101&lt;STRONG&gt;/128&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Search&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;| index=vulnerability_index&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;``` &lt;STRONG&gt;if cidrmatch then ```&amp;nbsp; &amp;nbsp;???&lt;/STRONG&gt;&lt;BR /&gt;ip="$ip_token$"&lt;BR /&gt;&lt;BR /&gt;-------------------------------------------------------&lt;BR /&gt;Note that &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;my search with regex below works for both ipv4 and ipv6&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; and it's faster than 3rd party ipv6compress function&lt;BR /&gt;my original question:&amp;nbsp;&lt;STRONG&gt; is it possible only to bypass regex statement for ipv4 (only use regex for ipv6)?&lt;/STRONG&gt;&lt;BR /&gt;I was able to use drilldown condition in XML source as a workaround, but it made the code complex and it's not transferrable to Dashboard Studio&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Search:&lt;/STRONG&gt;&lt;BR /&gt;| index=vulnerability_index&lt;BR /&gt;| rex mode=sed field=ip "s/&amp;lt;regex&amp;gt;/&amp;lt;replacement&amp;gt;/&amp;lt;flags&amp;gt;"&lt;BR /&gt;| search ip="$ip_token$"&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 14:51:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658610#M227486</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-25T14:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658612#M227488</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I think my original question was not clear. My apology.&lt;BR /&gt;&lt;U&gt;my search with regex below works for both ipv4 and ipv6&lt;/U&gt;&lt;SPAN&gt;&amp;nbsp;and it's faster than 3rd party ipv6compress function&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;my original question:&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is it possible only to bypass regex statement for ipv4 (only use regex for ipv6)?&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;I was able to use drilldown condition in XML source as a workaround, but it made the code complex and it's not transferrable to Dashboard Studio. Thank you for your help.&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Search&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;| index=vulnerability_index&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| rex mode=sed field=ip "s/&amp;lt;regex&amp;gt;/&amp;lt;replacement&amp;gt;/&amp;lt;flags&amp;gt;"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| search ip="$ip_token$"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 14:56:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658612#M227488</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-25T14:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658708#M227514</link>
      <description>&lt;P&gt;rex can only happen after scooping up all events. &amp;nbsp;That is why you feel slow with your second search.&lt;/P&gt;&lt;P&gt;When match happens in search command, you only pick up that matching one. &amp;nbsp;The search is just as your first search. &amp;nbsp;No matter whether the token is IPv4 or IPv6, search command is the same&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=vulnerability_index ip="$ip_token$"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Consider the following mock data:&lt;/P&gt;&lt;TABLE width="98px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="97.96875px"&gt;10.10.10.12&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="97.96875px"&gt;50.10.10.17&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="97.96875px"&gt;10.10.10.23&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="97.96875px"&gt;fa00:0:0:0::1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="97.96875px"&gt;fa00:0:0:0::2&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;1. $ip_token$ =&amp;nbsp;fa00::1/128&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;2023-09-25 22:05:27&lt;/TD&gt;&lt;TD&gt;fa00:0:0:0::1&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval ip = split("10.10.10.12
50.10.10.17
10.10.10.23
fa00:0:0:0::1
fa00:0:0:0::2", "
")
| mvexpand ip
| search ip=fa00::1/128
``` the above emulates
index=vulnerability_index ip = fa00::1/128
```&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. $ip_token$ =&amp;nbsp;10.10.10.23/32&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;2023-09-25 22:13:01&lt;/TD&gt;&lt;TD&gt;10.10.10.23&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval ip = split("10.10.10.12
50.10.10.17
10.10.10.23
fa00:0:0:0::1
fa00:0:0:0::2", "
")
| mvexpand ip
| search ip=10.10.10.23/32
``` the above emulates
index=vulnerability_index ip = 10.10.10.23/32
```&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 05:22:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658708#M227514</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-26T05:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: run different filter in an index search based on a condition in dropdown</title>
      <link>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658926#M227570</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;Thanks for your help.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;There was a workaround to use condition value using a drilldown&lt;BR /&gt;&lt;A href="https://community.splunk.com/t5/Dashboards-Visualizations/Condition-value-using-a-drilldown/m-p/255914" target="_blank"&gt;https://community.splunk.com/t5/Dashboards-Visualizations/Condition-value-using-a-drilldown/m-p/255914&lt;/A&gt;&lt;BR /&gt;It worked fine when I&amp;nbsp; tested it, but the issue is it's difficult to read and it's not transferrable to Dashboard Studio&lt;BR /&gt;&amp;lt;eval token="dmp"&amp;gt;if(like($row.VulnerableIPs$,":"), "| search ip=\"" . $row.VulnerableIPs$ . "\" | rex mode=sed field=ip \"s/&amp;lt;regex&amp;gt;/&amp;lt;replacement&amp;gt;/&amp;lt;flags&amp;gt;"", "ip=" . $row.VulnerableIPs$ )&lt;BR /&gt;&amp;lt;/eval&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 00:19:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/run-different-filter-in-an-index-search-based-on-a-condition-in/m-p/658926#M227570</guid>
      <dc:creator>LearningGuy</dc:creator>
      <dc:date>2023-09-28T00:19:01Z</dc:date>
    </item>
  </channel>
</rss>

