Splunk Search

I want to limit the search that matches the values which are a part of lookup

innoce
Path Finder

I want to limit the search that matches the "dest" values which are a part of lookup
Currently I am getting all events 😐

Lookup: host.csv  lookup columns: aa bb

I tried something like below: 

 

|tstats summariesonly=f count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (condition)[|inputlookup host.csv |fields + aa |rename aa as Processes.dest] by Processes.dest 

 

 

Any help would be appreciated!

Thanks

Labels (2)
Tags (2)
0 Karma

diogofgm
SplunkTrust
SplunkTrust

I would check the inspector as it should give you some hints on what the final search that splunk is using after the sub search. Check remoteSearch

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about what you're trying to do.  What results do you want?

Have you looked at the manual for the inputlookup command?  It accepts a where option that limits the matches.  See https://docs.splunk.com/Documentation/Splunk/8.2.4/SearchReference/Inputlookup#Syntax

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...