Splunk Search

Search Event from ID in a lookup

Oaknoy
New Member

Hello everybody ! probably this is a very easy thing to do, however I'm struggling here as my experience in splunk is very limited.

So I have a lookup table with the newly created ID in Cloudfront that updates biweekly as below:

ID Time
E1G0rS2CXF0DMJ 2019-12-161213:34:19Z
EZZ9D48580D6N 2019-12-161213:32:49Z
E2CNDYMBrP0JEL 2019-12-161213:31:25Z
E9858L1YVLNGBV 2019-12-161213:30:01Z
12VS98N9858JPVI 2019-12-161213:28:36Z
12C0PJH02J958ZG 2019-12-161213:27:10Z
E1VR8CB8YGL001 2019-12-161213:25:48Z

So what I want to do is using the ID stored in the lookup, I'd like to verify whether protection has been applied to those newly created distributions by correlating with below event name, and output the ones that protection was not applied.

index=test eventName=CreateProtection

Thank you in advance !

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Oaknoy,
let me understand: do you want to search in the test index all the IDs that are in the lookup or what else?
if this is what you want, you can run something like this:

index=test eventName=CreateProtection [ | inputlookup my_lookup.csv | fields ID ]
| ...

if instead you want to use the other fields of the lookup, you could run something like this:

index=test eventName=CreateProtection 
| lookup my_lookup.csv ID OUTPUT other fields
| ...

Ciao.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Oaknoy,
let me understand: do you want to search in the test index all the IDs that are in the lookup or what else?
if this is what you want, you can run something like this:

index=test eventName=CreateProtection [ | inputlookup my_lookup.csv | fields ID ]
| ...

if instead you want to use the other fields of the lookup, you could run something like this:

index=test eventName=CreateProtection 
| lookup my_lookup.csv ID OUTPUT other fields
| ...

Ciao.
Giuseppe

0 Karma

Oaknoy
New Member

Hi Giuseppe,

Thanks a lot for your help !

What I want to do is using those ID stored in a lookup ( this lookup stores all the newly created ID) check if an specific event ( in this case, CreateProtection) has been applied to those IDs.

So, for instance, I want to verify if there's an event CreateProtection for E1G0rS2CXF0DMJ which is a newly created ID in order to know the unprotected IDs without having to create two different queries.

Thanks again !

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Oaknoy,
ok, using the first search you have all the events that match with the IDs of the lookup.

Beware only to one point: the key field (ID) must have the same name both in lookup and in search (field name must be the same and is case sensitive), in other words, check that the ID field (written exctly in the same way) is extracted in the search.

If this answer solves your need, please accept and/or upvote it, otherwise, please share more infos to help you.

Ciao.
Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...