Splunk Search

append lookup help

mcbradford
Contributor

I have a search I use to associate a "likely" user to an IP

search query | dedup src | fields src user |inputlookup src_user.csv append=true | dedup src |table src, user| outputlookup src_user.csv

I am not getting accurate results and my theory is....

The results are appended to the end of the table. Splunk reads the table from top to bottom. Splunk gets the first match and then stops. The first match is old data.

Does my search look correct? How can I fix this?

Update...

I think I identified one issue. I studied by lookup table and there are no duplicate IPs, but there are duplicate users. I want the table to represent the last know IP associated with a user. If a new IP is associated with a user, remove the old entry.

Ideas????

Tags (1)
0 Karma

lukejadamec
Super Champion

It looks like you need to configure Maximum Matches in the Advanced Options of the lookup definition.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...