Splunk Search

Search keyword from file input

phaniraj345
Engager

Hello Team, 

I have about 10K keywords to search. It is not practical to construct a large query like below 

index=dev (key=val1 OR key=val2 OR key=val3.....key=val10000)

Is there any other way to search?

Thanks

Phaniraj

Labels (1)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

Could you try to put those keywords on lookup file or kv-table and use it as a sub search?

Something like this

index=dev [ |inputlookup keys.csv | fields key | format ]

r. Ismo 

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Could you try to put those keywords on lookup file or kv-table and use it as a sub search?

Something like this

index=dev [ |inputlookup keys.csv | fields key | format ]

r. Ismo 

0 Karma

phaniraj345
Engager

Hi, 

Should key (fields key) be the name of the field in the event log?

Thanks

Phaniraj

0 Karma

phaniraj345
Engager

Hi, 

I got the query working. Thanks a lot for the help!

Thanks

Phaniraj

0 Karma

samneo
Path Finder

could you just do something like the below with a wildcard

index=dev key=val* | stats count by key

0 Karma

phaniraj345
Engager

I can't use the regular express * as the values are unique without any patterns

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...