Splunk Search

Index <--> KV lookup column issue

kashz
Explorer

Hi,
So, I have an issue when I try to lookup KV store to columns in a data model based on a eval function.

So to give more context and better understanding, I have firewall logs with the following fields:
{ src_ip, src_port, dest_ip, dest_port }

I have a kvstore1 lookup with columns as: { ipAddress, score }
I have a kvstore2 lookup with columns as: { critical_ipAddress }

What I'm trying to achieve:
Show scores (from kvstore1) for ipAddress from firewall logs (both, src_ip and dest_ip) IF they are critical (from kvstore2)

So I created a data model.
Global Search: eventtype = "firewall-logs" -> That gives me the base search.
Now adding child: is where I'm stuck?

  1. I need to perform either DUAL lookup with kvstore2 mapping src_ip <-> ipAddress & dest_ip <-> ipAddress. Would this be using EVAL?
  2. Then, perform lookup of the result of (1) with kvstore1 to map to scores.

How would one perform these ?

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...