Splunk Search

How do you use an inputlookup to search through all event fields?

asp82
New Member

I have a one column lookup. I want to see if any of the values in the lookup appear in ANY field of my events. And I want any matching events to be returned. Is there a way to do this? Thank you in advance

Lookup name ActivityTest, lookup field name CustomerID (this field name is not a field name in the events)

0 Karma

bryhenderson
Explorer

You can probably accomplish the search by using a subsearch and changing the field name to search (example below). This will cause the search to just look at the value of your field in the lookup table as opposed to field="value".

search index="test" [|inputlookup ActivityTest|rename CustomerID AS search|fields + search]
0 Karma

asp82
New Member

Thanks for the suggestion.

I tried this and got 138 results using a test lookup with 5 customerIds. If I manually search for these 5 ids, I get a total of 634 results. Looking at the events that are excluded from the first query but present in the second one's results, it's not clear to me that there's any meaningful difference. Any clue why these matches would drop out?

Also, I structured CustomerID in the lookup as 123 so that it shouldn't matter if something comes immediately before or after it.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud’s AI Assistant in Action Series: Analyzing and ...

This is the second post in our Splunk Observability Cloud’s AI Assistant in Action series, in which we look at ...

Elevate Your Organization with Splunk’s Next Platform Evolution

 Thursday, July 10, 2025  |  11AM PDT / 2PM EDT Whether you're managing complex deployments or looking to ...

Splunk Answers Content Calendar, June Edition

Get ready for this week’s post dedicated to Splunk Dashboards! We're celebrating the power of community by ...