Splunk Search

How do I join an inputlookup and a tstats search?

PotatoDataUser
Explorer

So I have a lookup file with a complete list of servers and their details like version, owner etc, and an index my_index that gets logs from servers.

This is the search I am using right now

| inputlookup my_lookup.csv
| join type=left server_name
   [ | tstats count where index=my_index by host
      | eval reporting="yes"]

| eval reporting=if(isnull(reporting),"No","Yes")


I want to validate the list by referencing it against the tstats reports and show the whole list of the lookupfile.

What I want to know is if this search is accurate, will the subsearch truncate results giving me inaccurate output, is there any alternate way to write this search, Please help.

Labels (3)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust
| tstats ...
| inputlookup append=t ...
| stats values(*) as * by host

 

View solution in original post

PickleRick
SplunkTrust
SplunkTrust
| tstats ...
| inputlookup append=t ...
| stats values(*) as * by host

 

gcusello
SplunkTrust
SplunkTrust

Hi @PotatoDataUser ,

try using the lookup command (https://docs.splunk.com/Documentation/Splunk/9.3.1/SearchReference/Lookup)

| tstats count where index=my_index by host
| lookup my_lookup.csv server_name

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...