Getting Data In

Create a Report of lookup table values minus search results

ejwade
Contributor

I have a search returning all the uuids of firewall policies used in the last 30 days:

sourcetype=fortinet_fortigate_syslog vd=mgt policyid!=0 | table poluuid | dedup poluuid

I have a CSV containing a master list of all policy uuids configured on the firewall.

/opt/splunk/etc/system/lookups/uuids.csv

I would like to construct a search so I can return the values from uuids.csv, less the search results of the uuids from the last 30 days. This is backwards compared to a lookup search I've created in the past. Any ideas?

0 Karma

hardikJsheth
Motivator

You can also try using append command to merge results of two queries and then filter the results where count =1 as follows:

sourcetype=fortinet_fortigate_syslog vd=mgt policyid!=0 | dedup poluuid | rename poluuid as uuid | table uuid | append [|inputlookup uuid.csv | table uuid] | stats count by uuid | search count =1  |table uuid.
0 Karma

cmerriman
Super Champion

Have you tried using the ‘set diff’ command?
http://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Set

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...