Splunk Search

I want to limit the search that matches the values which are a part of lookup

innoce
Path Finder

I want to limit the search that matches the "dest" values which are a part of lookup
Currently I am getting all events 😐

Lookup: host.csv  lookup columns: aa bb

I tried something like below: 

 

|tstats summariesonly=f count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (condition)[|inputlookup host.csv |fields + aa |rename aa as Processes.dest] by Processes.dest 

 

 

Any help would be appreciated!

Thanks

Labels (2)
Tags (2)
0 Karma

diogofgm
SplunkTrust
SplunkTrust

I would check the inspector as it should give you some hints on what the final search that splunk is using after the sub search. Check remoteSearch

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about what you're trying to do.  What results do you want?

Have you looked at the manual for the inputlookup command?  It accepts a where option that limits the matches.  See https://docs.splunk.com/Documentation/Splunk/8.2.4/SearchReference/Inputlookup#Syntax

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...