Splunk Search

How do I add fields from a lookup table to my search event?

angshul
Path Finder

I have a lookup table geo-lookup.csv which has data in the format:
IP, Coordinates, Location.

My search has the field ipAddress which is used as the filter to match the IP field in the table. I want the Location field to be added to the search events for the matching ipAddress field.

I'm using the command:
base search | lookup geo-lookup IP as ipAddress OUTPUTNEW Location as location

Can anyone tell me where I'm going wrong?
All my permissions and lookup definitions are configured correctly.

Tags (1)
0 Karma
1 Solution

Vijeta
Influencer

@angshul - make sure you mention exact name with csv extension for your lookup.
base search | lookup geo-lookup.csv IP as ipAddress OUTPUTNEW Location as location

View solution in original post

0 Karma

Vijeta
Influencer

@angshul - make sure you mention exact name with csv extension for your lookup.
base search | lookup geo-lookup.csv IP as ipAddress OUTPUTNEW Location as location

0 Karma

angshul
Path Finder

Thanks for the help.
The issue was I had to use the fields within double quotes.
Its working now

0 Karma
Get Updates on the Splunk Community!

Expert Tips from Splunk Professional Services, Ensuring Compliance, and More New ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Observability Release Update: AI Assistant, AppD + Observability Cloud Integrations & ...

This month’s releases across the Splunk Observability portfolio deliver earlier detection and faster ...

Stay Connected: Your Guide to February Tech Talks, Office Hours, and Webinars!

💌Keep the new year’s momentum going with our February lineup of Community Office Hours, Tech Talks, ...