Splunk Search

Can you help me do an outputlookup with a condition?

jip31
Motivator

Hello

I use the code below.

I'm doing an outputlookup at the end of the query, but I want to do it with a condition.

The condition is that Build=1511.

Do i have to use a where command or there is another solution please??

eventtype="AppliEV" Level=* 
| dedup host 
| stats count by host 
| append 
    [ search index="ai-wkst-windows-fr" sourcetype=WinRegistry key_path="\\registry\\machine\\xx" 
        OR 
        key_path="\\registry\\machine\\xx" 
    | eval OS=if(key_path=="\\registry\\machine\\software\\xx), 
        Build=if(key_path=="\\registry\\machine\\software\\xx) 
    | stats latest(OS) as OS latest(Build) as Build by host ] 
| stats values(OS) as OS values(Build) as Build by host 
| stats count as Total by OS Build host | fields - host | outputlookup build.csv
1 Solution

nryabykh
Path Finder

Hi!

You can use a where command in this way:


...
| stats count as Total by OS Build host
| fields - host
| appendpipe
[where Build="1511"
| outputlookup override_if_empty=f build.csv
| where nofield="novalue"]

It helps to avoid overriding build.csv with empty file in case of Build is not 1511.

View solution in original post

nryabykh
Path Finder

Hi!

You can use a where command in this way:


...
| stats count as Total by OS Build host
| fields - host
| appendpipe
[where Build="1511"
| outputlookup override_if_empty=f build.csv
| where nofield="novalue"]

It helps to avoid overriding build.csv with empty file in case of Build is not 1511.

grittonc
Contributor

This is awesome! Thank you.

0 Karma

jip31
Motivator

many thanks

0 Karma
Get Updates on the Splunk Community!

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...

Combine Multiline Logs into a Single Event with SOCK: a Step-by-Step Guide for ...

Combine multiline logs into a single event with SOCK - a step-by-step guide for newbies Olga Malita The ...