Splunk Search

Blacklist lookup - search query

astackpole
Path Finder

I have a blacklist.csv file that looks like the following,

namedescription
*vpn*VPN was found.
*putty*Putty was found.

 

I'm trying this search and it's showing events match, but not outputting the name/description fields from the lookup.

index=os 
| lookup blacklist.csv name OUTPUT description 
| table name description

 

My goal is to search each event for every value in the name column, so the basic query I'm trying to match with the use of a lookup file is,

index=os
| search *vpn* OR *putty*

 

What lookup query do I need to implement this type of search and display the results?

Labels (1)
0 Karma

somesoni2
Revered Legend

The lookup table files (CSV lookup) doesn't support wildcard match on it's own. YOu've to create a lookup definition that supports wildcard match.  Have a look at this post for more details:

https://community.splunk.com/t5/Splunk-Search/Can-we-use-wildcard-characters-in-a-lookup-table/td-p/...

0 Karma

astackpole
Path Finder

What if there's no specific field I'm trying to search on?

0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...