Splunk Search

inputlookup and append search problem. Expect output all rows but only rows with result shows

netinstall
Engager

Please help, want to do a search based on a table of sever-list and find last update time from a server log. I try to create a table first with 4 server listed, I had one server 2.2.2.2. had result in server log. so I expect the result is 4 rows with 2.2.2.2 had totalcount and date and other is empty/null but showing 4 rows. But the result is the inputlookup and append/appendcols will show 1 row only.

Any method to show 4 rows instead. Can any one had experience on it. Thanks

Using this Searchstring sample

| inputlookup append=true hosts_1.csv  | table yumclientip,team,is_expected,totalcount,yumdate | join yumclientip append [ search xxx yyy zzzz | setfields count="0" yumdate="NA" | stats count as totalcount by yumclientip, yumdate  | fillnull value="(empty)" "totalcount" "yumdate"  | dedup yumclientip sortby +_time ]

csv file hosts)1.csv

##################
yumclientip,team,is_expected
1.1.1.1,teamA,true
2.2.2.2,teamB,true
3.3.3.3,teamC,true
4.4.4.4,teamD,true

Result get (only 2.2.2.2 had data)

########################
yumclientip,team,is_expected,totalcount,yumdate
2.2.2.2,teamA,true,18,2017-07-23

But expect result want 4 rows and not 1 rows only

####################
yumclientip,team,is_expected,totalcount,yumdate
1.1.1.1,teamA,true,empty,empty
2.2.2.2,teamB,true,18,2017-07-23
3.3.3.3,teamC,true,empty,empty
4.4.4.4.teamD,true,empty,empty
0 Karma

DalJeanis
Legend

append is not a valid keyword for join. What this line

| join yumclientip append     [ search ...]

...will do is take the results from the first part of the search, and then try to join that set of records to the set of records returned by the second search, joining them based on the values in the fields named yumclientip and append on each side of the search.

Since the only fields on the right side of the search are totalcount, yumclientip and yumdate, there will never be a match found.

Delete the word "append" from the join clause and see what happens.

I'm still not sure that you have the correct code for what you want, but at least you will get some results.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...