Splunk Search

Search keyword from file input

phaniraj345
Engager

Hello Team, 

I have about 10K keywords to search. It is not practical to construct a large query like below 

index=dev (key=val1 OR key=val2 OR key=val3.....key=val10000)

Is there any other way to search?

Thanks

Phaniraj

Labels (1)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

Could you try to put those keywords on lookup file or kv-table and use it as a sub search?

Something like this

index=dev [ |inputlookup keys.csv | fields key | format ]

r. Ismo 

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Could you try to put those keywords on lookup file or kv-table and use it as a sub search?

Something like this

index=dev [ |inputlookup keys.csv | fields key | format ]

r. Ismo 

0 Karma

phaniraj345
Engager

Hi, 

Should key (fields key) be the name of the field in the event log?

Thanks

Phaniraj

0 Karma

phaniraj345
Engager

Hi, 

I got the query working. Thanks a lot for the help!

Thanks

Phaniraj

0 Karma

samneo
Path Finder

could you just do something like the below with a wildcard

index=dev key=val* | stats count by key

0 Karma

phaniraj345
Engager

I can't use the regular express * as the values are unique without any patterns

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...