Splunk Search

Events mismatch values with lookup values

uagraw01
Motivator

Hello Splunkers!!

We have events that contains source and destination fields with complete values, and we want to match these fields against event data where the corresponding fields (source and destination) may include wildcard values in the lookup. The goal is to accurately match the event data with the appropriate lookup values, ensuring that wildcard patterns in the lookup are properly evaluated during the matching process.

uagraw01_1-1732174446045.png

Values to be match with below lookup.

uagraw01_2-1732174790327.png

What I have tried so far to match events field values with the lookup field values. But no luck found. Please give me some suggestion to execute this correctly.

| lookup movement_type_ah mark_code as mark_code destination as destination source as source OUTPUTNEW movement_type

 

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @uagraw01 ,

what's the issue?

did you unflagged the checkbox for exact match in the Lookup Definition?

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @uagraw01 ,

what's the issue?

did you unflagged the checkbox for exact match in the Lookup Definition?

Ciao.

Giuseppe

uagraw01
Motivator

@gcusello As per the below screenshot, I need to specify in the match_type for both the fields ?

uagraw01_0-1732175319306.png

FYI @gcusello  I have added below entries and it starts working as expected.

WILDCARD(source), WILDCARD(position), WILDCARD(destination)

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @uagraw01 ,

good for you, remember to unflag the Case sensitive match.

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...