Splunk Search

Index <--> KV lookup column issue

kashz
Explorer

Hi,
So, I have an issue when I try to lookup KV store to columns in a data model based on a eval function.

So to give more context and better understanding, I have firewall logs with the following fields:
{ src_ip, src_port, dest_ip, dest_port }

I have a kvstore1 lookup with columns as: { ipAddress, score }
I have a kvstore2 lookup with columns as: { critical_ipAddress }

What I'm trying to achieve:
Show scores (from kvstore1) for ipAddress from firewall logs (both, src_ip and dest_ip) IF they are critical (from kvstore2)

So I created a data model.
Global Search: eventtype = "firewall-logs" -> That gives me the base search.
Now adding child: is where I'm stuck?

  1. I need to perform either DUAL lookup with kvstore2 mapping src_ip <-> ipAddress & dest_ip <-> ipAddress. Would this be using EVAL?
  2. Then, perform lookup of the result of (1) with kvstore1 to map to scores.

How would one perform these ?

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...