<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Lookup to determine Field Value in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744785#M241314</link>
    <description>&lt;P&gt;Sorry it took so long to get back.&amp;nbsp; The second Option is starting to get where I need to be. I appreciate the code. How do I keep the host from the original log and have the second column in that has the value I want to compare the columns too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using ITSI but I Originally I thought if I were looking at the event in this custom log using things we all know.&lt;/P&gt;&lt;P&gt;LOG:&lt;/P&gt;&lt;P&gt;host&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; CPU&amp;nbsp; &amp;nbsp; &amp;nbsp;MeM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; UsePct&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Swapused&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apple1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 7&lt;/P&gt;&lt;P&gt;Apple2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 12&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;9&lt;/P&gt;&lt;P&gt;Apple3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 4&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 8&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lookup&lt;/P&gt;&lt;P&gt;host&amp;nbsp; &amp;nbsp; &amp;nbsp;fieldName&amp;nbsp; &amp;nbsp; &amp;nbsp;Comparefield&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; CPU&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;7&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;MEM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Swapused&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Code&lt;/P&gt;&lt;P&gt;I thought I could do the foreach line in the log&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If (&amp;lt;field&amp;gt; Log&amp;lt;=&amp;lt;fieldName&amp;gt;Lookup, "OK", &amp;lt;fieldName&amp;gt;"Error")&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Apr 2025 13:29:27 GMT</pubDate>
    <dc:creator>dlm</dc:creator>
    <dc:date>2025-04-23T13:29:27Z</dc:date>
    <item>
      <title>Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744303#M241235</link>
      <description>&lt;P&gt;I have a unique situation with my customer. I want to create a lookup table that the customer can put&amp;nbsp; fields they want the value for.&lt;/P&gt;&lt;P&gt;lookup has column called fieldvalue . ie. CPU in the list.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if that field is cpu is in the table for instance, then we have to run a calculation with the Cpu field. for all the events who have cpu.&amp;nbsp;&lt;/P&gt;&lt;P&gt;fields customer selects are number fields. The things i have tried are not returning the value in the cpu field.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Without discussing customer stuff, using calculated fields won't work, KPI stuff won't work. For what they want, I need to do it this way.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 16:23:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744303#M241235</guid>
      <dc:creator>dlm</dc:creator>
      <dc:date>2025-04-16T16:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744316#M241236</link>
      <description>&lt;P&gt;It sounds like you've settled on what might be a unsuitable solution to the problem.&amp;nbsp; Tell us more about the problem itself and we may be able to suggest a better solution.&lt;/P&gt;&lt;P&gt;Lookup tables are for enriching events with additional fields based one or more fields already in the events.&amp;nbsp; It's not a conditional-execution mechanism.&lt;/P&gt;&lt;P&gt;If this part of a dashboard (or can be made into a dashboard) then you have better options.&amp;nbsp; You can have inputs the user can select to determine which calculations are made.&amp;nbsp; That is well-trodden ground so let us know if that path sounds feasible.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 18:19:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744316#M241236</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2025-04-16T18:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744340#M241239</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243365"&gt;@dlm&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im not entirely sure what it is you're trying to achieve so this might not be the best way to achieve it, but hoepfully one of the below examples might help!&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can give us more details (ideally with examples) then we might be able to give a better specific answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I started by creating a lookup:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_0-1744838669508.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38599i61735F0BF31ACBB8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_0-1744838669508.png" alt="livehybrid_0-1744838669508.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The examples work around using a subsearch to get the list from the lookup&lt;/P&gt;&lt;P&gt;Option 1:&lt;/P&gt;&lt;P&gt;This adds a prefix of my_ to the fields listed in the lookup&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults 
| eval CPU=45, Memory=12.3, Disk=84.4, Network=92 
| rename [| inputlookup fields.csv 
| eval fieldName=fieldName+" AS my_"+fieldName
    | stats list(fieldName) as search ]&lt;/LI-CODE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_1-1744838705439.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38600iB4C9DF5576C919D0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_1-1744838705439.png" alt="livehybrid_1-1744838705439.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 2:&lt;/P&gt;&lt;P&gt;This uses "table" to only list the fields in the lookup, with an optional field showing the fields (example of foreach)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults 
| eval CPU=45, Memory=12.3, Disk=84.4, Network=92 
| table 
    [| inputlookup fields.csv 
    | stats list(fieldName) as search] 
| foreach * 
    [| eval fields=mvappend(fields,"&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;")]&lt;/LI-CODE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_2-1744838713542.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38601i055463E710F407A4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_2-1744838713542.png" alt="livehybrid_2-1744838713542.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 21:30:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744340#M241239</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-04-16T21:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744785#M241314</link>
      <description>&lt;P&gt;Sorry it took so long to get back.&amp;nbsp; The second Option is starting to get where I need to be. I appreciate the code. How do I keep the host from the original log and have the second column in that has the value I want to compare the columns too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using ITSI but I Originally I thought if I were looking at the event in this custom log using things we all know.&lt;/P&gt;&lt;P&gt;LOG:&lt;/P&gt;&lt;P&gt;host&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; CPU&amp;nbsp; &amp;nbsp; &amp;nbsp;MeM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; UsePct&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Swapused&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apple1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 7&lt;/P&gt;&lt;P&gt;Apple2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 12&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;9&lt;/P&gt;&lt;P&gt;Apple3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 4&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 8&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lookup&lt;/P&gt;&lt;P&gt;host&amp;nbsp; &amp;nbsp; &amp;nbsp;fieldName&amp;nbsp; &amp;nbsp; &amp;nbsp;Comparefield&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; CPU&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;7&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;MEM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4&lt;/P&gt;&lt;P&gt;*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Swapused&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Code&lt;/P&gt;&lt;P&gt;I thought I could do the foreach line in the log&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If (&amp;lt;field&amp;gt; Log&amp;lt;=&amp;lt;fieldName&amp;gt;Lookup, "OK", &amp;lt;fieldName&amp;gt;"Error")&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 13:29:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744785#M241314</guid>
      <dc:creator>dlm</dc:creator>
      <dc:date>2025-04-23T13:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744789#M241315</link>
      <description>&lt;P&gt;I forgot to say when I was doing the spl, I did the mvexpand on the field column so I can just look at each field individually for that line in the log. Then I can alert only on something that is bad. But having the host and the value to compare was where I have issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 13:57:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/744789#M241315</guid>
      <dc:creator>dlm</dc:creator>
      <dc:date>2025-04-23T13:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745093#M241361</link>
      <description>&lt;P&gt;At this location, We handle setting up ITSI and not SA for teams for monitoring. They work with us as we need them. I am in ITSI creating alerts with correlation searches our correlation searches have about 20 lines of required fields that show in the alerts after the calculations. All I need to know is determine if the fields for the event meets or exceeds that percent criteria, if it does it'll generate a of low or high based on what they put in the lookup for the severity.&amp;nbsp; I could do a case statement in the code but I am trying not to hard code. If I put it into the lookup, if the customer changes their mind on the percents later or they want it to be a low alert instead of critical, they can modify the table without the code being touched.&amp;nbsp; If you do a custom KPI, I haven't been able to allow the required fields that have to be in the alert for the monitoring group.&lt;BR /&gt;&lt;BR /&gt;Here, once the code for that index goes live then it is considered production. Which means, one small change of code requires going thru the testing process between us, the team and the monitoring group who watches the alerts.&amp;nbsp; It's a whole ordeal.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SO, If I can create a table where the team can say a field and the percent&amp;nbsp; then it is easier.&amp;nbsp; Each event in the log the customer is creating has multiple fields to check. The only thing I care about is the host, the field value and the severity.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am trying to avoid hard coding. If I can't come up with a way to use the lookups, I will do it.&amp;nbsp; I know that this is NOT what people normally do, but sometimes you have to think outside the box to make life easier. Teams don't know what they want and constantly change their minds. When we are working to onboard new indexes in the building for infrastructure and applications...our team of 4 doesn't have time to do a lot of changes when someone changes their minds.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2025 11:14:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745093#M241361</guid>
      <dc:creator>dlm</dc:creator>
      <dc:date>2025-04-28T11:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745102#M241362</link>
      <description>&lt;LI-CODE lang="markup"&gt;| makeresults
| fields - _time
| eval _raw="host,CPU,MeM,UsePct,Swapused
Apple1,5,3,2,7
Apple2,4,1,12,9
Apple3,1,2,4,8"
| multikv forceheader=1
| table host,CPU,MeM,UsePct,Swapused
| lookup hostmetrics.csv host
| foreach *
    [| eval fieldvalue=if(fieldname="&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;",&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;,fieldvalue)]
| eval metric=if(fieldvalue &amp;lt; value,"OK","Error")&lt;/LI-CODE&gt;&lt;P&gt;I set up hostmetrics.csv like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults format=csv data="host,fieldname,value
Apple1,CPU,4
Apple3,MeM,2
Apple2,UsePct,8"
| outputlookup hostmetrics.csv&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 28 Apr 2025 13:55:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745102#M241362</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-04-28T13:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using Lookup to determine Field Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745362#M241430</link>
      <description>&lt;P&gt;Love the code but&amp;nbsp; it seemed to only do one value in the lookup. What if that event (comparing host in table to event) has 2 fields that don't have null values that need compared to the 2 in the lookup table.&amp;nbsp; Like in your example they all had the same columns, 3 fields were in the table and the event had 4 different fields.&lt;/P&gt;&lt;P&gt;But I have something to start playing with. I will continue to play with this while onboarding other stuff. Look forward to hearing from you again.&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2025 11:08:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Lookup-to-determine-Field-Value/m-p/745362#M241430</guid>
      <dc:creator>dlm</dc:creator>
      <dc:date>2025-05-02T11:08:20Z</dc:date>
    </item>
  </channel>
</rss>

