<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic lookup command in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460216#M129822</link>
    <description>&lt;P&gt;Here you go. &lt;/P&gt;</description>
    <pubDate>Tue, 15 Oct 2019 14:37:59 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2019-10-15T14:37:59Z</dc:date>
    <item>
      <title>Basic lookup command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460213#M129819</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;I am curious the best way to write the following lookup query.&lt;/P&gt;

&lt;P&gt;I have a 1 column lookup of firewall rule names. I would like to search our firewall index and use the lookup to determine which firewall rules haven't been used in the last 30 days. &lt;/P&gt;

&lt;P&gt;Thanks for your time and help.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 19:15:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460213#M129819</guid>
      <dc:creator>clozach</dc:creator>
      <dc:date>2019-10-14T19:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Basic lookup command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460214#M129820</link>
      <description>&lt;P&gt;Try something like this (assuming there is a field firewall_rule available in your firewall data and same field name is used in  your single column lookup. )&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourFirewallIndex [| inputlookup firewall_rulename.csv | table firewall_rule ]
| stats count by firewall_rule 
| append [| inputlookup firewall_rulename.csv | table firewall_rule | eval count=0]
| stats max(count) as count by firewall_rule | where count=0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 14 Oct 2019 19:27:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460214#M129820</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2019-10-14T19:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Basic lookup command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460215#M129821</link>
      <description>&lt;P&gt;Hi somesoni2,&lt;/P&gt;

&lt;P&gt;Thanks so much! This worked. I'm not sure how to accept it as an answer since it is a comment, but I appreciate the help. If you re-post as an answer I will mark it as accepted.&lt;/P&gt;

&lt;P&gt;Again, thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 14:30:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460215#M129821</guid>
      <dc:creator>clozach</dc:creator>
      <dc:date>2019-10-15T14:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Basic lookup command</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460216#M129822</link>
      <description>&lt;P&gt;Here you go. &lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 14:37:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Basic-lookup-command/m-p/460216#M129822</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2019-10-15T14:37:59Z</dc:date>
    </item>
  </channel>
</rss>

