Getting Data In

How do I search multiple source types based on a lookup file?

tusharsaran1
Path Finder

Is there a way to search events from multiple source types when the list of source types is available in a lookup file?

0 Karma
1 Solution

KailA
Contributor

HI !

To complete a bit @elpred0 answer, if you are not used to play with sub search, this is a more complete example of what your search should look like.

index=yourIndex [|inputlookup sourcetype.csv | fields sourcetype]
| your search

That should return all the events in yourIndex with the specified sourcetype in sourcetype.csv

KailA

View solution in original post

KailA
Contributor

HI !

To complete a bit @elpred0 answer, if you are not used to play with sub search, this is a more complete example of what your search should look like.

index=yourIndex [|inputlookup sourcetype.csv | fields sourcetype]
| your search

That should return all the events in yourIndex with the specified sourcetype in sourcetype.csv

KailA

osakachan
Communicator

Hi @tusharsaran1 ,

Try this ...

in the search part of the query add this subsearch

[ |inputlookup lookup
|fields sourcetype
| format]

If the field of the lookup is sourcetype and the values are correctly you will have something like this
( ( sourcetype="a" ) OR ( sourcetype="b" ) OR... etc

Here de docs of format http://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Format

Get Updates on the Splunk Community!

Pro Tips for First-Time .conf Attendees: Advice from SplunkTrust

Heading to your first .Conf? You’re in for an unforgettable ride — learning, networking, swag collecting, ...

Raise Your Skills at the .conf25 Builder Bar: Your Splunk Developer Destination

Calling all Splunk developers, custom SPL builders, dashboarders, and Splunkbase app creators – the Builder ...

Hunt Smarter, Not Harder: Discover New SPL “Recipes” in Our Threat Hunting Webinar

Are you ready to take your threat hunting skills to the next level? As Splunk community members, you know the ...