Splunk Search

Rest search with input from inputlook

jariw
Path Finder

Hi,

I'm bouncing my head against the wall for this (probably) simple question..

 

I've got a inputlookup "indexers". As the name says.. those are the splunk indexers, but will be more than that in the future. I want to get disc sizes off them with the below serach

|inputlookup indexers | fields host | stats count by host |map search="search (| rest splunk_server=$host$ /services/server/status/partitions-space]")

It all goes well until the map command. The stats gives a nice list off the servers. It goes wrong at the "search (| rest splunk_server=$host$ /services/server/status/partitions-space]"   part.

When i try this part off the search.. it strips the | from the search.. and gives nothing. It seems a search command followed with a | will strip the | .. and then de rest search is useless.

What can i do to pass the hostnames from the inputlookup to the |rest search?

 

Thanx in advance

 

grts

Jari

 

 

 

 

Labels (1)
0 Karma
1 Solution

manjunathmeti
Champion

Hi Jari,

You don't need to run sub-search for each host. Run rest command first, append lookup results, and use stats to merge.

| rest /services/server/status/partitions-space 
| append 
    [| inputlookup indexers 
    | fields host 
    | stats count by host 
    | eval splunk_server=host] 
| stats max(*) as * by splunk_server 
| where host="*"

 

| where host="*" gives results only for hosts in the lookup file.

If this reply helps you, an upvote/like would be appreciated.

View solution in original post

0 Karma

jariw
Path Finder

Yes.. That's it. Didn't think about changing the order. Thanx again 👍

0 Karma

manjunathmeti
Champion

please accept and upvote answer if it is working.

0 Karma

manjunathmeti
Champion

Hi Jari,

You don't need to run sub-search for each host. Run rest command first, append lookup results, and use stats to merge.

| rest /services/server/status/partitions-space 
| append 
    [| inputlookup indexers 
    | fields host 
    | stats count by host 
    | eval splunk_server=host] 
| stats max(*) as * by splunk_server 
| where host="*"

 

| where host="*" gives results only for hosts in the lookup file.

If this reply helps you, an upvote/like would be appreciated.

0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...