Splunk Search

Only return results with field appearing in a lookup

pjb2160
Path Finder

Hello,

I'm looking to only return results for "ad_x" log entries which have an "event_code" listed in the "ad_event_codes.csv" lookup:

sourcetype="ad_x" event_code=[inputlookup ad_event_codes.csv | fields event_code]

I feel I'm close but can't quite get it to work. Any pointers?

Cheers.

Tags (1)
0 Karma
1 Solution

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

View solution in original post

pjb2160
Path Finder

Many thanks!

0 Karma

kml_uvce
Builder

use this...

sourcetype="ad_x" [|inputlookup ad_event_codes.csv | fields event_code]

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...