Splunk Search

How to save search results to KV store?

pragadeesh
New Member

I have a simple search:

index =abc OR index =xxx |transaction DIGEST | eval match_count=mvcount(sourcetype) | eval Digest_MATCH=if(match_count==2,"MATCH","MISSING") | table _time, DIGEST, Digest_MATCH, sourcetype

I want store all rows where digest_match = missing into KV store and lookup values to see if there any matches for missing values in future searches.

0 Karma

sundareshr
Legend

Here is a great posting on this subject

http://dev.splunk.com/view/webframework-developapps/SP-CAAAEZH

jluo_splunk
Splunk Employee
Splunk Employee

Hi Pragadeesh,

You'll need to use the outputlookup command to push those results into a lookup. From there, you can convert your lookup table to a KV Store.

0 Karma
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...