Splunk Search

Lookup file 3000 entries, need to divide into events, so I can isolate user flow of client ip events

roderick001
Explorer

My search is | inputlookup "edgarlog2.csv"

The lookup file has no events attached to it, what is a way to add events from a lookup file whilst viewing it in the main search and reporting app?

Any help would be great, thanks.

Labels (1)
0 Karma

roderick001
Explorer

Thnaks a lot @to4kawa , I will look into it and get back to you.

 

0 Karma

to4kawa
Ultra Champion

What is the content of CSV?

0 Karma

roderick001
Explorer

Hi @to4kawa sorry for late reply, the csv file has 15 fields with client ip and date and file references, I can't load it from add data and can only add as lookup, but lookup does not allow me to view it as timestamped events. 

Why can I not load it as add data?

Why can I not view events from lookup?

Thanks  a lot for any help.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...