Splunk® Enterprise

Knowledge Manager Manual

Splunk Enterprise version 9.0 will no longer be supported as of June 14, 2024. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.

Add field matching rules to your lookup configuration

These attributes provide field matching rules for lookups. They can be applied to all four lookup types. Add them to the transforms.conf stanza for your lookup.

Attribute Type Description Default
max_matches Integer The maximum number of possible matches for each value input to the lookup table from your events. Range is 1-1000. If the time_field attribute is is not specified, Splunk software uses the first <integer> entries, in file order. If the time_field attribute is specified (because it is a time-bounded lookup), Splunk software uses the first <integer> entries, in descending time order. In other words, up to <max_matches> are allowed to match. When this number is surpassed, Splunk software uses the matches closest to the lookup value. 100 if the time_field attribute is not specified. 1 if the time_field attribute is specified.
min_matches Integer The minimum number of possible matches for each value input to the lookup table from your events. You can use default_match to help with situations where there are fewer than min_matches for any given input. 0 for both non-time-bounded lookups and time-bounded lookups, which means nothing is output to your event if no match is found.
default_match String When min_matches is greater than 0 and and Splunk software finds fewer than min_matches for any given input, it provides this default_match value one or more times until the min_matches threshold is reached.

Splunk software treats NULL values as matching values and does not replace them with the default_match value.

Empty string
case_sensitive_match Boolean Specify true to consider case when matching input lookup table fields. Specify false to ignore case when matching lookup fields.

Does not apply to KV Store lookups. Reverse lookups also require reverse_lookup_honor_case_sensitive_match=true.
true
reverse_lookup_honor_case_sensitive_match Boolean For reverse lookups, the definition of the "input field" and the "output field" are flipped. Because the Splunk software applies case_sensitive_match to the input field, this means that reverse lookups need an additional case-sensitive match setting for the output field. When reverse_lookup_honor_case_sensitive_match=true and when case_sensitive_match=true, Splunk software performs case-sensitive matching for all fields in reverse lookups. When reverse_lookup_honor_case_sensitive_match=false, Splunk software performs case-insensitive matching for all fields in reverse lookups, even when case_sensitive_match=true.

This setting does not apply to KV Store lookups. This setting may default to false in an upcoming release.
true
match_type String Allows non-exact matching of one or more fields arranged in a list delimited by a comma followed by a space. Format is match_type = <match_type>(<field_name1>, <field_name2>,...<field_nameN>). Set match_type to WILDCARD to apply wildcard matching, or set it to CIDR to apply CIDR matching (specifically for IP address values). EXACT (does not need to be specified)

Example of using match_type for IPv6 CIDR match

In this example, you can use the the match_type attribute in addition to the lookup command to determine whether a specific IPv6 address is in a CIDR subnet. You can follow along with the example by performing these steps.

  1. Create a lookup table in the $SPLUNK_HOME/etc/apps/search/lookups folder called ipv6test.csv that contains the following text.
  2. ip,expected
    2001:0db8:ffff:ffff:ffff:ffff:ffff:ff00/120,true

    Note that the ip field in the lookup table contains the subnet value, not the IP address. This is because the match_type attribute that will be added to the transforms.conf file in the next step tells the lookup command that the value in that field is to be treated as a CIDR subnet for matching purposes.

  3. Add the following entry to your local transforms.conf file, which is typically located in the $SPLUNK_HOME/etc/system/local folder. See How to edit a configuration file.
  4. [ipv6test]
    filename = ipv6test.csv
    match_type=CIDR(ip)

  5. Run the following search to match the IP address to the subnet.
  6. | makeresults | eval ip="2001:0db8:ffff:ffff:ffff:ffff:ffff:ff99" | lookup ipv6test ip OUTPUT expected

    The IP address is in the subnet, so search displays true in the expected field. The search results look something like this.

    time expected ip
    2020-11-19 16:43:31 true 2001:0db8:ffff:ffff:ffff:ffff:ffff:ff99

See also

Commands
iplocation
search
Functions
cidrmatch
Last modified on 27 March, 2023
Configure geospatial lookups   Configure a time-based lookup

This documentation applies to the following versions of Splunk® Enterprise: 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.10, 8.1.11, 8.1.12, 8.1.13, 8.1.14, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 8.2.11, 8.2.12, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.0, 9.3.1, 9.3.2, 9.4.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters