Getting Data In

Ingest time lookup to add fields does not work

patelmc
Explorer

I need to use federated search which does not support search time lookup at this time in splunk 8.2.2.1.

I came across splunk doc to add fields at ingest time (index time) based on ingest time lookup. 

https://docs.splunk.com/Documentation/Splunk/8.2.3/Data/IngestLookups

What I am trying to do is during event ingestion I am looking for value of field "application" and match that with the CSV file as shown below and trying to add fields APP and COMP based on application value. 

e.g. if incoming event has application=Linux add APP field with value 9001 and COMP field as 8001.

But it does not work.  Please help. 

Here are the following files I created as documented. 

more /opt/splunk/etc/system/lookups/APP_COMP.csv
application,APP,COMP
Linux,9001,8001
Console,9002,8002
Windows,9003,8003

more /opt/splunk/etc/system/local/props.conf
 [access_combine_wcookie]
TRANSFORMS = Active_Events

/opt/splunk/etc/system/local/transforms.conf
[Active_Events]
INGEST_EVAL= APPCOMP=lookup("APP_COMP.csv", json_object("application", application), json_array("APP", "COMP"))

more /opt/splunk/etc/system/local/fields.conf
[APP]
INDEXED = True
[COMP]
INDEXED = True

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...