Splunk Search

Lookup file 3000 entries, need to divide into events, so I can isolate user flow of client ip events

roderick001
Explorer

My search is | inputlookup "edgarlog2.csv"

The lookup file has no events attached to it, what is a way to add events from a lookup file whilst viewing it in the main search and reporting app?

Any help would be great, thanks.

Labels (1)
0 Karma

roderick001
Explorer

Thnaks a lot @to4kawa , I will look into it and get back to you.

 

0 Karma

to4kawa
Ultra Champion

What is the content of CSV?

0 Karma

roderick001
Explorer

Hi @to4kawa sorry for late reply, the csv file has 15 fields with client ip and date and file references, I can't load it from add data and can only add as lookup, but lookup does not allow me to view it as timestamped events. 

Why can I not load it as add data?

Why can I not view events from lookup?

Thanks  a lot for any help.

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...