Splunk Search

search field for many values

ltruesda
Explorer

I need a search which returns events where a specific field contains any one of many values. Typically this is done with the "OR" logical operator. However, I need to search for thousands of values which cannot be expressed using a regular expression.

I've seen discussions of using "lookups" for this. However, if I understand correctly, that would require administrative access to the Splunk server (which I don't have) to configure the lookup file and later update it.

I've also seen suggestions to write a script to generate a massive search string with all the "OR"s in it. I'd like to investigate other solutions before adopting that idea.

Ideally, I'd like to provide the list of field values to match in a file.

Is there a way?

Thanks,

Larry

Tags (3)
0 Karma
1 Solution

lguinn2
Legend

You don't need administrative access to the Splunk server to create a lookup. You can use the GUI.
The instructions are in the Splunk Tutorial here

View solution in original post

lguinn2
Legend

You don't need administrative access to the Splunk server to create a lookup. You can use the GUI.
The instructions are in the Splunk Tutorial here

ltruesda
Explorer

I confirmed that it is true that you can provision the lookup_file via manager. 🙂

I ended up using "... | lookup lookup_file.csv user_id_field as user | search tag_field = 1" where the lookup_file has two columns, user_id_field and tag_field". And each row contains a userid and a '1'.

Works great. Thanks!

0 Karma

stevenacasey
New Member

splunk tutorial link is broken

0 Karma

ltruesda
Explorer

Hello, thanks for your suggestion, but as mentioned in my question I have looked into lookups and I believe it would require administrative access to the Splunk server to configure (e.g. edit .conf file and upload lookup file to appropriate folder) and maintain (e.g. replace lookup file when the search terms change) the lookup files. This is something I do not have and cannot get.

0 Karma

kristian_kolb
Ultra Champion

Perhaps you can investigate the inputlookup / outputlookup methods of creating and maintaining a lookup file, e.g.

|inputlookup file | modify stuff | outputlookup file

http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Inputlookup
http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Outputlookup

http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/

/K

0 Karma
Get Updates on the Splunk Community!

Technical Workshop Series: Splunk Data Management and SPL2 | Register here!

Hey, Splunk Community! Ready to take your data management skills to the next level? Join us for a 3-part ...

Spotting Financial Fraud in the Haystack: A Guide to Behavioral Analytics with Splunk

In today's digital financial ecosystem, security teams face an unprecedented challenge. The sheer volume of ...

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability As businesses scale ...