<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ES incident_review_lookup in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241127#M188885</link>
    <description>&lt;P&gt;Thanks for the detail (I don't have Splunk Es license so I needed to see).  I will write the search asap. On mobile right now.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2016 09:17:37 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2016-03-14T09:17:37Z</dc:date>
    <item>
      <title>ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241123#M188881</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;

&lt;P&gt;In Splunk ES, is it possible to create a realtime alert for any update in incident_review KV store? The search query ( | inputlookup append=T incident_review_lookup) will always list the entire contents of incident_review KV store. I want to use KV store's time field as Splunk search reference time. Any help is really appreciated.&lt;/P&gt;

&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:02:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241123#M188881</guid>
      <dc:creator>ziax</dc:creator>
      <dc:date>2020-09-29T09:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241124#M188882</link>
      <description>&lt;P&gt;Lookups are not the same as kv store.  I think you've confused the terms.  Lookups are csv files on the filesystem.  Kv store is a MongoDB instance.&lt;/P&gt;

&lt;P&gt;It sounds like you want to use the time field that is in the lookup in conjunction with your time picker.  If you'll give us an example of the time field name and value that is returned from the lookup, then we can tell you how to use |eval _time=convert(lookupTimeField) or similar so that the time picked applies to the time stamp in the lookup, etc&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2016 19:32:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241124#M188882</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-13T19:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241125#M188883</link>
      <description>&lt;P&gt;You could run a search every five minutes like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|`incident_review` | where _time &amp;gt;= relative_time(now(), "-6m@m") AND _time &amp;lt; relative_time(now(), "-m@m")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That'll look at each new entry exactly once. You rarely really need actual realtime searches to fulfil requirements - if quick reaction is a thing, you could schedule this every minute and reduce the "indexing delay" shift:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|`incident_review` | where _time &amp;gt;= relative_time(now(), "-75s") AND _time &amp;lt; relative_time(now(), "15s")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone reacting to that alert is hardly going to be quick enough for those 75s maximum delay to matter.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2016 19:56:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241125#M188883</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-13T19:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241126#M188884</link>
      <description>&lt;P&gt;Thank you all for the response.&lt;/P&gt;

&lt;P&gt;@jkat54,&lt;BR /&gt;
Both time field in the lookup and _time field showing in the results are same, only format is different. Please find attached screenshot.&lt;BR /&gt;
I searched for last 1min logs, it lists the entire contents of lookup table.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1119iE7AEF925FAACDC40/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;@martin_mueller&lt;BR /&gt;
The solution you suggested was my workaround. I need a real-time search rather than scheduled search. Because I want to run a script for every search results ( using script argument $8). For real time search alerts only I think the action can be triggered for every search results (Trigger condition is Per result). &lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 07:26:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241126#M188884</guid>
      <dc:creator>ziax</dc:creator>
      <dc:date>2016-03-14T07:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241127#M188885</link>
      <description>&lt;P&gt;Thanks for the detail (I don't have Splunk Es license so I needed to see).  I will write the search asap. On mobile right now.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 09:17:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241127#M188885</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-14T09:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241128#M188886</link>
      <description>&lt;P&gt;Does this work?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |'incident_review' | convert ctime(time) | eval _time=time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |'incident_review' | convert ctime(time) ctime(_time) | eval _time=time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ive had to do this so many times, but cant remember exactly how.  I usually would use strftime or strptime but i cant make it work today... you might try that in place of my convert and evals...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |'incident_review' | eval _time=strftime(time,"%Y-%m-%d %H:%M:%S.%3N")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 14 Mar 2016 10:28:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241128#M188886</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-14T10:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241129#M188887</link>
      <description>&lt;P&gt;I have tested all the three search queries. No way &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; . It was dumping entire contents.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 11:03:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241129#M188887</guid>
      <dc:creator>ziax</dc:creator>
      <dc:date>2016-03-14T11:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241130#M188888</link>
      <description>&lt;P&gt;How about this using lookup instead:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |lookup incident_review_lookup OUTPUT time AS _time rule_id As rule ....
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 14 Mar 2016 11:58:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241130#M188888</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-14T11:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241131#M188889</link>
      <description>&lt;P&gt;Re your comment under the question: You can run per-result alert actions regardless of realtime or not.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 22:14:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241131#M188889</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-14T22:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241132#M188890</link>
      <description>&lt;P&gt;For using lookup command instead, we need a lookup field, which we don't have.&lt;/P&gt;

&lt;P&gt;Error : Error in 'lookup' command: Must specify one or more lookup fields. &lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 12:01:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241132#M188890</guid>
      <dc:creator>ziax</dc:creator>
      <dc:date>2016-03-16T12:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241133#M188891</link>
      <description>&lt;P&gt;Sorry, my bad. Yes, we can run it for every results.&lt;BR /&gt;
This is my work-around solution If I am not able to create a real-time alert.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 12:06:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241133#M188891</guid>
      <dc:creator>ziax</dc:creator>
      <dc:date>2016-03-16T12:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241134#M188892</link>
      <description>&lt;P&gt;Just go with the "workaround" - it's extremely rare that someone actually &lt;EM&gt;needs&lt;/EM&gt; a real-time alert as opposed to a frequently running scheduled alert.&lt;/P&gt;

&lt;P&gt;Additionally, running a real-time search on a lookup feels really wrong. The real-time facility is there to intercept matching events during indexing, that doesn't happen with lookups.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 19:47:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241134#M188892</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-16T19:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241135#M188893</link>
      <description>&lt;P&gt;If you have sufficient permissions you could try a different approach: Updates to the incident review lookup should leave a trail in &lt;CODE&gt;_audit&lt;/CODE&gt;. Building a real-time or scheduled search with the regular timerange controls should be quite simple.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 19:49:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241135#M188893</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-16T19:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241136#M188894</link>
      <description>&lt;P&gt;Very true... Interesting problem which has peaked my interest ;-D. &lt;/P&gt;

&lt;P&gt;So can you take input lookup results to summary index and then query the summary index directly with some time = _time trickery?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 20:03:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241136#M188894</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-17T20:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241137#M188895</link>
      <description>&lt;P&gt;I guess you lose the real time then.  So it's like you need to copy inputlookup.py to inputlookupRT.py and then dive into Python so that it yields one result at a time versus all results.  &lt;/P&gt;

&lt;P&gt;I am interested in helping with this custom Splunk command if you like.&lt;/P&gt;

&lt;P&gt;You might get better and quicker results opening a ticket with Splunk though.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 20:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241137#M188895</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-03-17T20:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: ES incident_review_lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241138#M188896</link>
      <description>&lt;P&gt;That "summary index" already exists - it's called &lt;CODE&gt;_audit&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 20:22:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ES-incident-review-lookup/m-p/241138#M188896</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-17T20:22:20Z</dc:date>
    </item>
  </channel>
</rss>

