Splunk Search

Automatic Lookup not working

joseft
Explorer

CSV file
Source_IP,Source_Name
18.130.101.34,AWS
18.130.215.107,AWS

or

Source_IP,Source_Name
"18.130.101.34",AWS
"18.130.215.107",AWS

Transforms.conf
[network_whitlist_def]
batch_index_query = 0
case_sensitive_match = 1
filename = network_whitelist.csv
fields_list = Source_IP, Source_Name

Props.conf
[OktaIM2:log]
LOOKUP-network_whitelist = network_whitlist_def Source_IP AS x OUTPUTNEW Source_Name

sourcetype=OktaIM2:log client.ipAddress="18.130.101.34" | spath path=client{}.ipAddress output=x | lookup network_whitelist.csv Source_IP AS x OUTPUTNEW Source_Name AS whitelist

The manual lookup works fine and adds a new field called whitelist
However, sourcetype=OktaIM2:log client.ipAddress="18.130.101.34" | spath path=client{}.ipAddress output=x does not work, (Splunk version 7.2) Any clues would be appreciated

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...