I´m new to splunk and need a short hint, concerning the following question:
I have some Firewall logs in Splunk and would like to search in the Destination (DST) field for specific Servers.
I uploaded a Server-2.csv and a " | inputlookup Server-2.csv " shows the content of the file correctly.
A manual search like " index=firewall DST=188.8.131.52 " works fine.
From my point of view a " index=firewall [ | inputlookup Server-2.csv | table DST ] " should do a search for every entry in the CSV file, but I get no error and no result.
There should be a result because 184.108.40.206 is in the CSV as first entry.
Is the table entry the wrong syntax?
Sorry if this question is too simple, but I really would appreciate some hints.
thx for the ultrafast reply. 😄
When i try your example, i will get the following error:
Error in 'lookup' command: Could not find all of the specified lookup fields in the lookup table.
The field DST is available in firewall raw events.
In the CSV File are only plain IP adresses nothing else.
Do i have to define a new field called "newfieldfromcsv", and if yes how?
I know newbie questions. 😆
THX again for your help!
[ | inputlookup Server-2.csv | table DST ] is called sub search in Splunk. It has got limitations in the way you are using it.
can you try using lookup command like below:
assuming field DST is available in firewall raw events as well.
newfieldfromcsv is extra field from lookup and this will be used to get events matched with firewall events
index=firewall | stats count by DST | lookup Server-2.csv DST OUTPUT newfieldfromcsv | where isnotnull(newfieldfromcsv)