Splunk Search

Lookup file 3000 entries, need to divide into events, so I can isolate user flow of client ip events

roderick001
Explorer

My search is | inputlookup "edgarlog2.csv"

The lookup file has no events attached to it, what is a way to add events from a lookup file whilst viewing it in the main search and reporting app?

Any help would be great, thanks.

Labels (1)
0 Karma

roderick001
Explorer

Thnaks a lot @to4kawa , I will look into it and get back to you.

 

0 Karma

to4kawa
Ultra Champion

What is the content of CSV?

0 Karma

roderick001
Explorer

Hi @to4kawa sorry for late reply, the csv file has 15 fields with client ip and date and file references, I can't load it from add data and can only add as lookup, but lookup does not allow me to view it as timestamped events. 

Why can I not load it as add data?

Why can I not view events from lookup?

Thanks  a lot for any help.

0 Karma
Get Updates on the Splunk Community!

Cultivate Your Career Growth with Fresh Splunk Training

Growth doesn’t just happen—it’s nurtured. Like tending a garden, developing your Splunk skills takes the right ...

Introducing a Smarter Way to Discover Apps on Splunkbase

We’re excited to announce the launch of a foundational enhancement to Splunkbase: App Tiering.  Because we’ve ...

How to Send Splunk Observability Alerts to Webex teams in Minutes

As a Developer Evangelist at Splunk, my team and I are constantly tinkering with technology to explore its ...