I am looking to filter events in splunk by values in a lookup table. I implemented the solution from this question, and it is partial working:
https://answers.splunk.com/answers/110381/use-lookup-to-filter-events.html
The change that I need to make is to have my lookup values be used in a "contains" filter as apposed to a literal/equal filter.
my sample code:
-search string-
[| inputlookup searchtermsample2.csv
| fields query]
| stats count by searchTerms
So... how do I rewrite so that there are wildcards on each side of the lookup field?
Below should do
-search string- [| inputlookup searchtermsample2.csv | fields query | eval query="\*".query."\*" | table query | format]