Splunk Search

Query returns zero events

anikeshp7
Path Finder

Any suggestions how the query can be improved  

This returns no events as of now.

In the lookup csv Im having UserId and Name as two columns. 

index=123  AND organizationId=00TY00000005677 AND logRecordType=ailtn (Lightning_Console) | dedup sessionKey | lookup test123.csv UserId AS userId OUTPUT UserId AS userId | table userId, sessionKey, _time

Labels (4)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

What would you like to do with lookup command here?

Lookups are used to enrich event information.

you are matching userid from events and lookup and again you are trying get userid from lookup. Were you trying to get name for userId?

have a look at below video.

https://youtu.be/E3-JaZEIXPw

————————————
If this helps, give a like below.
0 Karma

anikeshp7
Path Finder

Yes @thambisetty .  Trying to display names with session_key and time

0 Karma

thambisetty
SplunkTrust
SplunkTrust
index=123 organizationId=00TY00000005677 logRecordType=ailtn (Lightning_Console) 
| stats earliest(_time) as session_start latest(_time) as session_end by sessionKey,userId 
| lookup test123.csv UserId AS userId OUTPUT Name 
| convert ctime(*time) timeformat="%d/%m/%Y %T"
————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...