Splunk Search

How to create a search with dynamic changing host values

vrmandadi
Builder

index=wineventlog sourcetype=WinEventLog* earliest=-2d host=a OR host=b OR host=c OR host=d OR host=e OR host=f host=h _index_earliest=1533053889 _index_latest=1533053914
| sort 0 +_indextime
| eval message=_raw
| table _raw,_indextime,host

We have a lookup table which we update once every month which has the hosts .Can we write a write a query which will take the hosts data from the lookup table

0 Karma

solarboyz1
Builder

Use a subsearch to feed the list of hosts to the main search:

index=wineventlog sourcetype=WinEventLog* earliest=-2d  [ | inputlookup windows_server | fields host ]  | sort 0 +_indextime 
| eval message=_raw | table _raw,_indextime,host
0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...