Splunk Search

How do you use an inputlookup to search through all event fields?

asp82
New Member

I have a one column lookup. I want to see if any of the values in the lookup appear in ANY field of my events. And I want any matching events to be returned. Is there a way to do this? Thank you in advance

Lookup name ActivityTest, lookup field name CustomerID (this field name is not a field name in the events)

0 Karma

bryhenderson
Explorer

You can probably accomplish the search by using a subsearch and changing the field name to search (example below). This will cause the search to just look at the value of your field in the lookup table as opposed to field="value".

search index="test" [|inputlookup ActivityTest|rename CustomerID AS search|fields + search]
0 Karma

asp82
New Member

Thanks for the suggestion.

I tried this and got 138 results using a test lookup with 5 customerIds. If I manually search for these 5 ids, I get a total of 634 results. Looking at the events that are excluded from the first query but present in the second one's results, it's not clear to me that there's any meaningful difference. Any clue why these matches would drop out?

Also, I structured CustomerID in the lookup as 123 so that it shouldn't matter if something comes immediately before or after it.

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...