Splunk Search

Only return results with field appearing in a lookup

pjb2160
Path Finder

Hello,

I'm looking to only return results for "ad_x" log entries which have an "event_code" listed in the "ad_event_codes.csv" lookup:

sourcetype="ad_x" event_code=[inputlookup ad_event_codes.csv | fields event_code]

I feel I'm close but can't quite get it to work. Any pointers?

Cheers.

Tags (1)
0 Karma
1 Solution

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

View solution in original post

pjb2160
Path Finder

Many thanks!

0 Karma

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...