[Solution] @buzzard192 You can also successfully handle multivalues by following these steps: 1. sample log : /opt/log/iprange.log [14/May/2025:14:22:11] systemIP="192.168.1.10,10.10.10.10" 2. lookup file : /opt/splunk/etc/apps/myapp/lookups/systemIPLookup.csv cidr,location,region
192.168.1.0/24,Site-A,East
10.10.10.0/24, Site-B,East 3. transforms.conf file : /opt/splunk/etc/apps/myapp/local/transforms.conf [IPRange]
INGEST_EVAL = systemIP=replace(_raw, ".*systemIP=\"([^\"]+)\".*","\1"), systemIP:=split(systemIP,","), JSON=lookup("IPRangeLookup", json_object("cidr", $mv:systemIP$), json_array("location", "region"))
[IPRangeLookup]
batch_index_query = 1
case_sensitive_match = 1
filename=systemIPLookup.csv
match_type = CIDR(cidr)
max_matches = 1 4. props.conf file : /opt/splunk/etc/apps/myapp/local/props.conf [(?::){0}host::*]
TRANSFORMS = IPRange 5. Result
... View more