Splunk Search

I want to limit the search that matches the values which are a part of lookup

innoce
Path Finder

I want to limit the search that matches the "dest" values which are a part of lookup
Currently I am getting all events 😐

Lookup: host.csv  lookup columns: aa bb

I tried something like below: 

 

|tstats summariesonly=f count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (condition)[|inputlookup host.csv |fields + aa |rename aa as Processes.dest] by Processes.dest 

 

 

Any help would be appreciated!

Thanks

Labels (2)
Tags (2)
0 Karma

diogofgm
SplunkTrust
SplunkTrust

I would check the inspector as it should give you some hints on what the final search that splunk is using after the sub search. Check remoteSearch

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about what you're trying to do.  What results do you want?

Have you looked at the manual for the inputlookup command?  It accepts a where option that limits the matches.  See https://docs.splunk.com/Documentation/Splunk/8.2.4/SearchReference/Inputlookup#Syntax

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...