- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hi Splunkers,
As it's stated in documentation, fields like ip, mac, dns in Asset lookup should be "A pipe-delimited list of single ... " asset values.
Should this pipe-delimited list be done manually or should I expect Splunk to cook it automatically from different sources, for example when we have the following scope:
- CMDB (available asset lookup fields: nt_host (dns), owner)
- DNS Records (ip, dns)
- DHCP Records (ip,mac, dns)
- Windows Security Authentication (nt_host, owner)
- Network Identity Services (ip, owner)
The savedsearch just concatenates the lists, no matching and mixing happens, so the same hostname may occur many times, is there another required approach from ES side? Do I miss smth or we have to prepare appropriate format for final input?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Splunk ES will not dedup assets across input files. Let's say you have an IP that has multiple hostnames. Put them in the dns field pipe delimited and only have that IP in one row of one file.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Splunk ES will not dedup assets across input files. Let's say you have an IP that has multiple hostnames. Put them in the dns field pipe delimited and only have that IP in one row of one file.
