Splunk Search

Efficient filtering with high number of values from a lookup table

Simon
Contributor

Hi all,

I've got 16k and growing values in a CSV. I'd like to search for events matching those values, like

tag::eventtype="authentication" [| inputlookup cmdb_former_employees | fields user | return 999999 user ]

But it seems that this is pretty much inefficient and results in a very slow search.
Is there a better way to find events matching a large set of values form a lookup?

Thanks,
Simon

Tags (3)
0 Karma

starcher
Influencer

I'd try making that an auto lookup for the relevant sourcetypes.

0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...