Splunk Search

lookuptable compare with new event

Satsan
Engager

I called all the errors and created to lookup-table. I want to create a job which would compare the last 5 minutes of errors with errors in lookup-table . If it doesn't match it would trigger an alert ( means finding new error from existing)

Can we do this via Splunk query ? , if so can you please share the sample query

0 Karma

Shan
Builder

@Satsan,

Give a try with below answer..
You need to get the values from index which are not already available in lookup already. So when you get a new error alert can be triggered.

https://answers.splunk.com/answers/426035/search-for-items-not-matching-values-from-a-lookup-1.html

0 Karma

Satsan
Engager

Thank you, i will go ahead and try

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...