You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A collection of various useful lookup tables for Splunk, or any other program that can parse CSVs (Python, Excel, etc). Lookups provide an easy way to enrich your data by using a separate file to add context to your logs.
upload the table, provide the name of the file as it will appear in Splunk (just use the same name AND INCLUDE THE EXTENSION)
Lookup definitions --> Add new
select the app (likely Search), set the name (same as the CSV name, MINUS the extension, or with _definition suffix), File-based, select the lookup added in the previous step
set the name, select the lookup definition (again, based on the file uploaded), set the sourcetype to be affected
input field: left is the name inside the CSV/definition, right is field name CURRENTLY in the Splunk database. This is how the CSV joins/aligns itself to Splunk data.
output field: left is the name inside the CSV/definition, right is field name as it WILL appear in Splunk query results
The general naming convention, with few exceptions, is type_field-name-as-seen-in-Splunk_table.csv
collection of HTML tags and attributes known to contain links (though some may contain other objects); not all-inclusive; used by extractlinks as "link_dict"
optionally use typeName = types[type]["description"]subTypeName = types[type]["subtype"][subType]["description"] if also using the above type/subType variables