Splunk Search

Only return results with field appearing in a lookup

pjb2160
Path Finder

Hello,

I'm looking to only return results for "ad_x" log entries which have an "event_code" listed in the "ad_event_codes.csv" lookup:

sourcetype="ad_x" event_code=[inputlookup ad_event_codes.csv | fields event_code]

I feel I'm close but can't quite get it to work. Any pointers?

Cheers.

Tags (1)
0 Karma
1 Solution

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

kamal singh bisht

View solution in original post

pjb2160
Path Finder

Many thanks!

0 Karma

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

kamal singh bisht
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...