Splunk Search

Lookup file 3000 entries, need to divide into events, so I can isolate user flow of client ip events

roderick001
Explorer

My search is | inputlookup "edgarlog2.csv"

The lookup file has no events attached to it, what is a way to add events from a lookup file whilst viewing it in the main search and reporting app?

Any help would be great, thanks.

Labels (1)
0 Karma

roderick001
Explorer

Thnaks a lot @to4kawa , I will look into it and get back to you.

 

0 Karma

to4kawa
Ultra Champion

What is the content of CSV?

0 Karma

roderick001
Explorer

Hi @to4kawa sorry for late reply, the csv file has 15 fields with client ip and date and file references, I can't load it from add data and can only add as lookup, but lookup does not allow me to view it as timestamped events. 

Why can I not load it as add data?

Why can I not view events from lookup?

Thanks  a lot for any help.

0 Karma
Get Updates on the Splunk Community!

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

March Community Office Hours Security Series Uncovered!

Hello Splunk Community! In March, Splunk Community Office Hours spotlighted our fabulous Splunk Threat ...