Splunk Search

I want to limit the search that matches the values which are a part of lookup

innoce
Path Finder

I want to limit the search that matches the "dest" values which are a part of lookup
Currently I am getting all events 😐

Lookup: host.csv  lookup columns: aa bb

I tried something like below: 

 

|tstats summariesonly=f count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (condition)[|inputlookup host.csv |fields + aa |rename aa as Processes.dest] by Processes.dest 

 

 

Any help would be appreciated!

Thanks

Labels (2)
Tags (2)
0 Karma

diogofgm
SplunkTrust
SplunkTrust

I would check the inspector as it should give you some hints on what the final search that splunk is using after the sub search. Check remoteSearch

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about what you're trying to do.  What results do you want?

Have you looked at the manual for the inputlookup command?  It accepts a where option that limits the matches.  See https://docs.splunk.com/Documentation/Splunk/8.2.4/SearchReference/Inputlookup#Syntax

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...