<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hosts event search by lookup table in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562239#M195546</link>
    <description>In Linux there are not same kind of event ids as Windows have. In Linux there are several logs like syslog which have several different events from several processes/daemons. Depending of your configuration you could have sourcetypes, tags or other keywords which you can use in our queries.&lt;BR /&gt;For further help we must know what and how you are collecting those logs and are you using some TA's for that or are you doing tokenisation by yourself.&lt;BR /&gt;r. Ismo</description>
    <pubDate>Thu, 05 Aug 2021 12:13:46 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2021-08-05T12:13:46Z</dc:date>
    <item>
      <title>Hosts event search by lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562203#M195530</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have created a lookup table and imported it into SPLUNK. It has 2 columns, one called hosts the other called IPs. The columns are populated with the hosts I want to query. I'm very new to SPLUNK and would like to create a search that returns errors/events worth investigating from the hosts specified in the lookup file. I'll display the results on a dashboard and will be checking this daily for preventative maintenance on my system. I'm just after events worth looking in to and need to filter out irrelevant events to save time. Can anyone help? Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 08:18:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562203#M195530</guid>
      <dc:creator>ned692000</dc:creator>
      <dc:date>2021-08-05T08:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Hosts event search by lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562206#M195533</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237155"&gt;@ned692000&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;You can filter index events using &lt;STRONG&gt;inputlookup&lt;/STRONG&gt; in a sub-search like below. This will return the events for&lt;SPAN&gt;&amp;nbsp;the hosts specified in the lookup file&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=indexname sourcetype=sourcetypename [| inputlookup lookup_table | fields hosts | rename hosts as host | format]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this reply helps you, a like would be appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 08:31:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562206#M195533</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-08-05T08:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: Hosts event search by lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562235#M195544</link>
      <description>&lt;P&gt;Thanks for your reply, that worked and its very useful. I have a further question. Are there any keywords/ event ID's that I can use to filter out events for Linux machines? I have used event ID's for windows but not sure what to use for Linux. Thanks again&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 11:58:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562235#M195544</guid>
      <dc:creator>ned692000</dc:creator>
      <dc:date>2021-08-05T11:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Hosts event search by lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562239#M195546</link>
      <description>In Linux there are not same kind of event ids as Windows have. In Linux there are several logs like syslog which have several different events from several processes/daemons. Depending of your configuration you could have sourcetypes, tags or other keywords which you can use in our queries.&lt;BR /&gt;For further help we must know what and how you are collecting those logs and are you using some TA's for that or are you doing tokenisation by yourself.&lt;BR /&gt;r. Ismo</description>
      <pubDate>Thu, 05 Aug 2021 12:13:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562239#M195546</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2021-08-05T12:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Hosts event search by lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562251#M195555</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply, it's taking everything from var/messages via a forwarder. Is there anything I can use as a filter to reduce UN-useful messages. i.e. things I need to keep an eye on, rather than just normal system events&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 12:50:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hosts-event-search-by-lookup-table/m-p/562251#M195555</guid>
      <dc:creator>ned692000</dc:creator>
      <dc:date>2021-08-05T12:50:18Z</dc:date>
    </item>
  </channel>
</rss>

