Splunk Enterprise Security

How to monitor changes in kv store lookups

d4wc3k
Path Finder

Hello everyone

I have following problem:
I have set disabled flag in ip_intel by following query:
| inputlookup ip_intel where _key="js.arcgis.com"
| eval disabled="1"
| outputlookup append=true ip_intel

After some time I discovered that disabled field value disappeared.

My question how I can monitor when and why value isn't anymore in its place.
I thought about using internal indexes.

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...