Splunk Search

Search for a URL from a datamodel NOT in a lookup

mztopp
Explorer

For example:

|  tstats count from datamodel=test where * by test.url, test.user 

| rename test.* AS *

| search NOT

    [ | inputlookup list_of_domains

       | rename domain AS url

       | fields url ]

| table url, user

 

I want this to show me the urls from the DM that do NOT appear in the lookup, and then give me the corresponding usernames from the DM. But, this is not working properly. When I run this search, I still see some of the urls that are in the lookup. Please help!

Labels (3)
0 Karma
1 Solution

zonistj
Path Finder

The problem is you want to compare one value from one field across all values of a field in a lookup table. The best way I know to do this is to make your lookup table field a multivalue field then regex search that field with your datamodel field as the regex string in a case / match function.

Something like this:

|  tstats count from datamodel=test where * by test.url, test.user 

| rename test.* AS *

| eval match = “true”

| join type=left match

    [ | inputlookup list_of_domains

       | rename domain AS url

       | eval match = “true”

        | stats values(url) AS urls by match]

| eval matching = case(match(‘urls’,’url’),”true”,1=1,”false”)

| search matching = “false”


| table url, user

 

I’m typing on my phone so the ticks in the case statement might not be the right characters.

View solution in original post

0 Karma

zonistj
Path Finder

The problem is you want to compare one value from one field across all values of a field in a lookup table. The best way I know to do this is to make your lookup table field a multivalue field then regex search that field with your datamodel field as the regex string in a case / match function.

Something like this:

|  tstats count from datamodel=test where * by test.url, test.user 

| rename test.* AS *

| eval match = “true”

| join type=left match

    [ | inputlookup list_of_domains

       | rename domain AS url

       | eval match = “true”

        | stats values(url) AS urls by match]

| eval matching = case(match(‘urls’,’url’),”true”,1=1,”false”)

| search matching = “false”


| table url, user

 

I’m typing on my phone so the ticks in the case statement might not be the right characters.

0 Karma

mztopp
Explorer

This appears to be exactly what I needed. Thanks! It is REALLY expensive though, any idea on the limits Splunk has for this type of thing or how I can measure/manage that aspect of this? Thanks again!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Does this help?

|  tstats count from datamodel=test where * by test.url, test.user 
| rename test.* AS *
| search NOT
    [ | inputlookup list_of_domains
       | rename domain AS url
       | fields url 
       | format ]
| table url, user
0 Karma

mztopp
Explorer

The format command did not change my results unfortunately.

0 Karma
Get Updates on the Splunk Community!

Introduction to Splunk Observability Cloud - Building a Resilient Hybrid Cloud

Introduction to Splunk Observability Cloud - Building a Resilient Hybrid Cloud  In today’s fast-paced digital ...

Observability protocols to know about

Observability protocols define the specifications or formats for collecting, encoding, transporting, and ...

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...