Splunk Search

Search & compare value for each search result to value in CSV (inputlookup or lookup)

majlo333
Observer

Hi,

I have a query that goes something like this:

index=myindex 
| eval urgency="medium", account_name='awsMetadata.account.name'
| stats count values(account_name) as account_name, values(urgency) as urgency

I also have a CSV file which has the following columns and values

env, project_name
prod,prod_account11
dev,dev_account3
prod,prod_account55
qa,qa_account43

I wish to compare each of the results in the query above using "account_name" field with CSV file field "project_name", and if those two values match for each result, I wish to create a new field "env" in my results based on the "env" field from CSV file. 

eg. if query result "prod_account55" from account_name field is found in CSV file "prod_account55" from project_name field, extract prod value from env field as a new field in the results. 

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @majlo333 ,

you should try to use the lookup command ( https://docs.splunk.com/Documentation/Splunk/9.4.1/SearchReference/Lookup 😞

index=myindex 
| eval urgency="medium", account_name='awsMetadata.account.name'
| lookup your_lookup.csv project_name AS account_name OUTPUT env 
| stats 
     values(env) AS env 
     values(urgency) as urgency 
     BY account_name

Ciao.

Giuseppe

 

Get Updates on the Splunk Community!

Developer Spotlight with Brett Adams

In our third Spotlight feature, we're excited to shine a light on Brett—a Splunk consultant, innovative ...

Index This | What can you do to make 55,555 equal 500?

April 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...