Hi Guys,
The scenario that I am building is to use a dynamic txt or csv file to refine the search of an index full of syslog.
I have index=syslog that contains incoming syslog for 1000 servers, however for this specific scenario I only care about 150 high value hosts. Rather than searching index=syslog HOST1, HOST2 etc etc I would like to call on a CSV or txt file that contains the host names of the high value targets and create a search similar to index=syslog | search host=/opt/splunk/test/host.csv
I have been toying with using the transaction command to make this work but it provides undesirable outputs and I believe there should be an easier way......
Python is also an option I just hoped that splunk would have a field lookup option that does not consists of find and replace.
Thanks
... View more