Splunk Search

How to put field values in a table to call in a search instead of using OR boolean directive?

edookati
Path Finder

I am currently using the below query...
index=a field1="ABC" | join id [Search index=a AND (field2="B" OR field2="C" field2="D"...)]

But I have 85 distinct values for field2..., so instead of providing too many logical/OR expressions is there a way I can put all these values A, B, C, D ....& Z in a table and write something like...search if field2 is in the table...?

Tags (3)
0 Karma

somesoni2
Revered Legend

Try something like this

index=a field1="ABC" 
| join id [Search index=a [Search index=a | stats count by field2 | return field2]]

The innermost subsearch "[Search index=a | stats count by field2 | return field2]" will return 'OR' separate values to field2 to be used for subsearch.

0 Karma
Get Updates on the Splunk Community!

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...