Getting Data In

Filter using a lookup.

aly347774
Loves-to-Learn Lots

I want to write a query whose purpose is to print for users who are not authorized to enter, and of course with the presence of a lookup table, the people who are authorized to enter are present in it.

Labels (5)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Please share some anonymised sample events to show what you are working with

0 Karma

aly347774
Loves-to-Learn Lots

index="(index name)" sourcetype=source type (host="host1" OR host="host2")
| search NOT [| inputlookup (lookup table name ) | table username] action=success | stats values(username) as user

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

OK it looks like it should work - what is your question?

0 Karma

aly347774
Loves-to-Learn Lots

It does not retrieve the blacklist, but rather it retrieves some of the whitelist. I want to make it pass through the lookuptable and show the user who is not authorized to enter.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

The principle of what you are doing is correct. So, if it is not working, it may come down to the actually data, which understandably you might not want to share. How are the values which are getting through different to the ones which are being removed? How large is your lookup table? Are there any special characters being used?

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...