<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search Events on Hosts in Inputlookup File? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352635#M104385</link>
    <description>&lt;P&gt;I have this, however it's really slow...Is there a faster way to get this to run?  Basically we're wanting to narrow down Windows Install events to servers, and not desktops.&lt;/P&gt;

&lt;P&gt;index=systems sourcetype=WindowsUpdateLog eventtype=Update_Successful [inputlookup serverlist.csv | table cn | rename cn as host]  | stats count by host&lt;/P&gt;

&lt;P&gt;Would it be faster to have an inputlookup with workstation names and just a where clause host != workstationname?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Mar 2018 15:30:13 GMT</pubDate>
    <dc:creator>Kendo213</dc:creator>
    <dc:date>2018-03-14T15:30:13Z</dc:date>
    <item>
      <title>How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352633#M104383</link>
      <description>&lt;P&gt;I have a CSV that I've created via ldapsearch, that contains a single column with 'cn' and then a list of servers.&lt;/P&gt;

&lt;P&gt;I want to search a sourcetype on each of these servers  for a keyword.&lt;/P&gt;

&lt;P&gt;I'm having difficulty figuring this out.  Any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 14:56:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352633#M104383</guid>
      <dc:creator>Kendo213</dc:creator>
      <dc:date>2018-03-14T14:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352634#M104384</link>
      <description>&lt;P&gt;Try this code, it creates and ORed list of the servers in the cn name and passes that to a search.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search [| inputlookup yourlookup.csv | eval host=cn | return host]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is that what you intend?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:25:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352634#M104384</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T15:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352635#M104385</link>
      <description>&lt;P&gt;I have this, however it's really slow...Is there a faster way to get this to run?  Basically we're wanting to narrow down Windows Install events to servers, and not desktops.&lt;/P&gt;

&lt;P&gt;index=systems sourcetype=WindowsUpdateLog eventtype=Update_Successful [inputlookup serverlist.csv | table cn | rename cn as host]  | stats count by host&lt;/P&gt;

&lt;P&gt;Would it be faster to have an inputlookup with workstation names and just a where clause host != workstationname?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:30:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352635#M104385</guid>
      <dc:creator>Kendo213</dc:creator>
      <dc:date>2018-03-14T15:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352636#M104386</link>
      <description>&lt;P&gt;Unfortunately you are searching a non indexed field named eventtype. If you were;t your performance would be x1000 like this&lt;/P&gt;

&lt;P&gt;| tstats count where index="systems" AND sourcetype="WindowsUpdateLog" by host | &lt;BR /&gt;
| search [inputlookup serverlist.csv | rename cn as host | return host]&lt;/P&gt;

&lt;P&gt;But unless you start indexing that....&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352636#M104386</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T15:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352637#M104387</link>
      <description>&lt;P&gt;Your suggestion would worsen things even more. Because you would be doing the statistics over all the events instead of starting by filtering them right away&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:40:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352637#M104387</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T15:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352638#M104388</link>
      <description>&lt;P&gt;This does return much faster.  Could you explain from a technical perspective why that is?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:44:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352638#M104388</guid>
      <dc:creator>Kendo213</dc:creator>
      <dc:date>2018-03-14T15:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352639#M104389</link>
      <description>&lt;P&gt;If you just test this part, &lt;CODE&gt;| inputlookup yourlookup.csv | eval host=cn | return host&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;You'll see it returns an OR list of the hosts &lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:51:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352639#M104389</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T15:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352640#M104390</link>
      <description>&lt;P&gt;I do see that, however it's only returning the first host in the results.  Is that expected?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 16:05:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352640#M104390</guid>
      <dc:creator>Kendo213</dc:creator>
      <dc:date>2018-03-14T16:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352641#M104391</link>
      <description>&lt;P&gt;Yes I forgot to put the count. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| inputlookup yourlookup.csv | eval host=cn | return host count=10000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Mar 2018 16:10:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352641#M104391</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T16:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352642#M104392</link>
      <description>&lt;P&gt;This seems to cut off about 30 seconds on average.&lt;/P&gt;

&lt;P&gt;index=systems sourcetype=WindowsUpdateLog "Installation started" | search [inputlookup serverlist.csv | rename cn as host] | stats count by host &lt;/P&gt;

&lt;P&gt;I'm not sure from a Splunk perspective why that is, but it seems to work and run quickly (last run was 2 seconds vs 39)&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 19:20:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352642#M104392</guid>
      <dc:creator>Kendo213</dc:creator>
      <dc:date>2018-03-14T19:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to search Events on Hosts in Inputlookup File?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352643#M104393</link>
      <description>&lt;P&gt;Please don't forget to accept the answer and upvote&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 19:26:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-Events-on-Hosts-in-Inputlookup-File/m-p/352643#M104393</guid>
      <dc:creator>tiagofbmm</dc:creator>
      <dc:date>2018-03-14T19:26:12Z</dc:date>
    </item>
  </channel>
</rss>

