Splunk Search

please help on how to achieve the below kind of lookup/rename for 100+ fields of my events

New Member

My event log has comma separated field values of 100+ fields. Each field can have about 2-15 different values. Example if field10=3, I need to map to earth, field10=4, map to mars so on. If field11=4, map to blue, field11=5, map to red and so on. Please help with an example format of lookup csv and how to use it in the search bar so the searched events in the output show with the mapped values. thank you


my basic search gives
how to get output like

0 Karma


Create 2 lookup tables . One for color (color.csv) and other for Planets (Planets.csv)

Planets.csv will have fields -fields1 , planet
color.csv will have fields - field2, color

base query
| lookup Planets.csv fields1
|lookup color.csv fields2
| table fields1,planet,fields2,color.

0 Karma

New Member

Thank you, my issue is there are about 50 + useful fields out of 250 odd total fields, this means my lookup need to be 50 files. I think it is better to do just replace command in search for the value in fields?

0 Karma


What's your basic search? Is your lookup table has headers?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

 (view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...