<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using wildcards in splunk lookups, can't match second field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689297#M234907</link>
    <description>&lt;P&gt;Hello, I need help with the following scenario:&lt;/P&gt;&lt;P&gt;Let's say I have a log source with browser traffic data, one of the available fields is malware_signature&lt;/P&gt;&lt;P&gt;I made a lookup table to filter the results by 10 specific malwares I'd like to be alerted on, all 10 entries have wildcards like so, with another field called classification:&lt;/P&gt;&lt;TABLE border="1" width="45.219809335108124%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;malware_signature&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;classification&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;*mimikatz*&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;high&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I use inputlookup to filter the results it works well, but no matter what I tried I can't get the "classification" field to be added&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;works well for filtering:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature]&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;classification field won't show:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature classification]&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doesn't work:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature]&lt;BR /&gt;| lookup malware_list.csv malware_signature OUTPUT classification&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Clarification:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I use inputlookup for filtering the results to the logs I want to see by the malware_signature&lt;/P&gt;&lt;P&gt;After that I want to enrich the table with the classification field, but using the lookup command it won't catch the malware_signature with the wildcards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jun 2024 11:37:52 GMT</pubDate>
    <dc:creator>Josh1890</dc:creator>
    <dc:date>2024-06-02T11:37:52Z</dc:date>
    <item>
      <title>Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689297#M234907</link>
      <description>&lt;P&gt;Hello, I need help with the following scenario:&lt;/P&gt;&lt;P&gt;Let's say I have a log source with browser traffic data, one of the available fields is malware_signature&lt;/P&gt;&lt;P&gt;I made a lookup table to filter the results by 10 specific malwares I'd like to be alerted on, all 10 entries have wildcards like so, with another field called classification:&lt;/P&gt;&lt;TABLE border="1" width="45.219809335108124%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;malware_signature&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;classification&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;*mimikatz*&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;high&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I use inputlookup to filter the results it works well, but no matter what I tried I can't get the "classification" field to be added&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;works well for filtering:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature]&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;classification field won't show:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature classification]&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doesn't work:&lt;/P&gt;&lt;PRE&gt;[| inputlookup malware_list.csv | fields malware_signature]&lt;BR /&gt;| lookup malware_list.csv malware_signature OUTPUT classification&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Clarification:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I use inputlookup for filtering the results to the logs I want to see by the malware_signature&lt;/P&gt;&lt;P&gt;After that I want to enrich the table with the classification field, but using the lookup command it won't catch the malware_signature with the wildcards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 11:37:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689297#M234907</guid>
      <dc:creator>Josh1890</dc:creator>
      <dc:date>2024-06-02T11:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689298#M234908</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267290"&gt;@Josh1890&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your_search&amp;gt;
[| inputlookup malware_list.csv | rename malware_signature AS query | fields query ]&lt;/LI-CODE&gt;&lt;P&gt;in thsi way you perform a full text search using themalware_signature field.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 17:20:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689298#M234908</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-06-01T17:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689299#M234909</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;SPAN&gt;Giuseppe,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Will that allow me to add the classification field from the lookup table?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 17:42:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689299#M234909</guid>
      <dc:creator>Josh1890</dc:creator>
      <dc:date>2024-06-01T17:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689304#M234910</link>
      <description>&lt;P&gt;I am confused. &amp;nbsp;If you want to enrich data with classification, why use inputlookup? Just create a lookup with match_type=WILDCARD(malware_signature) if you haven't.&amp;nbsp;In your third search, I see that you have defined a lookup named malware_list.csv. &amp;nbsp;If so, you must have missed MATCH_TYPE. (See&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Knowledge/Usefieldlookupstoaddinformationtoyourevents#Create_a_CSV_lookup_definition" target="_blank" rel="noopener"&gt;Create a CSV lookup definition&lt;/A&gt;)&amp;nbsp;Then, use &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Lookup" target="_blank" rel="noopener"&gt;lookup&lt;/A&gt; command instead of inputlookup.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;``` your search that returns malware_signature ```
| lookup malware_list.csv malware_signature
| where isnotnull(classification)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 06:27:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689304#M234910</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-06-02T06:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689305#M234911</link>
      <description>&lt;P&gt;These are two different things. One thing is generating conditions using subsearch, another thing is enriching you results with a lookup.&lt;/P&gt;&lt;P&gt;Important thing though, generating conditions where search term has a wildcard at the beginning makes no sense performancewise. Splunk still has to read all events from the index and search them one by one. It cannot use indexed structures.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 08:36:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689305#M234911</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-06-02T08:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689309#M234912</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267290"&gt;@Josh1890&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as also&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;said, it's diefferent to search and to entich, using my solution you search for the patterns contained in your lookup.&lt;/P&gt;&lt;P&gt;If you need to agg the classification, the only way is to use the lookup command.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 09:17:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689309#M234912</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-06-02T09:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689317#M234913</link>
      <description>&lt;P&gt;Hey, yes I use inputlookup for filtering the results to the logs I want to see by the malware_signature&lt;/P&gt;&lt;P&gt;After that I want to enrich the table with the classification field, but using the lookup command it won't catch the malware_signature with the wildcards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 11:29:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689317#M234913</guid>
      <dc:creator>Josh1890</dc:creator>
      <dc:date>2024-06-02T11:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689318#M234914</link>
      <description>&lt;P&gt;Hey, yes I use inputlookup for filtering the results to the logs I want to see by the malware_signature&lt;/P&gt;&lt;P&gt;After that I want to enrich the table with the classification field, but using the lookup command it won't catch the malware_signature with the wildcards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 11:30:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689318#M234914</guid>
      <dc:creator>Josh1890</dc:creator>
      <dc:date>2024-06-02T11:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689320#M234915</link>
      <description>&lt;P&gt;You're right, but it'll run every 15 minutes for a limited amount of data, so we can suffer the performance issue&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 11:48:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689320#M234915</guid>
      <dc:creator>Josh1890</dc:creator>
      <dc:date>2024-06-02T11:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689322#M234916</link>
      <description>&lt;P&gt;Yes, but it makes no sense to add another layer of processing since you're gonna go through every event anyway.&lt;/P&gt;&lt;P&gt;So the best approach here would be to do&lt;/P&gt;&lt;PRE&gt;your basic search&lt;BR /&gt;| lookup enriching your data&lt;BR /&gt;| filter out data not matching your criteria based on lookup values&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 12:48:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689322#M234916</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-06-02T12:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Using wildcards in splunk lookups, can't match second field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689337#M234919</link>
      <description>&lt;P&gt;As I said, it only means that you didn't set up wildcard matching correctly. &amp;nbsp;Check your lookup setup.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 03:59:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-wildcards-in-splunk-lookups-can-t-match-second-field/m-p/689337#M234919</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-06-03T03:59:41Z</dc:date>
    </item>
  </channel>
</rss>

