Splunk Search

How do you use an inputlookup to search through all event fields?

asp82
New Member

I have a one column lookup. I want to see if any of the values in the lookup appear in ANY field of my events. And I want any matching events to be returned. Is there a way to do this? Thank you in advance

Lookup name ActivityTest, lookup field name CustomerID (this field name is not a field name in the events)

0 Karma

bryhenderson
Explorer

You can probably accomplish the search by using a subsearch and changing the field name to search (example below). This will cause the search to just look at the value of your field in the lookup table as opposed to field="value".

search index="test" [|inputlookup ActivityTest|rename CustomerID AS search|fields + search]
0 Karma

asp82
New Member

Thanks for the suggestion.

I tried this and got 138 results using a test lookup with 5 customerIds. If I manually search for these 5 ids, I get a total of 634 results. Looking at the events that are excluded from the first query but present in the second one's results, it's not clear to me that there's any meaningful difference. Any clue why these matches would drop out?

Also, I structured CustomerID in the lookup as 123 so that it shouldn't matter if something comes immediately before or after it.

0 Karma
Get Updates on the Splunk Community!

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...