Splunk Cloud Platform

Search Manual

Use lookup to add fields from lookup tables

You can match fields in your events to fields in external sources, such as lookup tables, and use these matches to add more information inline to your events.

A lookup table can be a static CSV file, a KV store collection, or the output of a Python script. You can also use the results of a search to populate the CSV file or KV store collection and then set that up as a lookup table. For more information about field lookups, see Configure CSV and external lookups and Configure KV store lookups in the Knowledge Manager Manual.

After you configure a fields lookup, you can invoke it from the Search app with the lookup command.


You have a field lookup named dnslookup which references a Python script that performs a DNS and reverse DNS lookup and accepts either a host name or IP address as arguments. You can use the lookup command to match the host name values in your events to the host name values in the lookup table, and add the corresponding IP address values to your events.

... | lookup dnslookup clienthost AS host OUTPUT clientip

See also

Related information
Configure external lookups in the Knowledge Manager Manual
Last modified on 15 January, 2020
Use the eval command and functions   Extract fields with search commands

This documentation applies to the following versions of Splunk Cloud Platform: 8.2.2112, 8.2.2201, 8.2.2202, 9.0.2205, 8.2.2203, 9.0.2208, 9.0.2209, 9.0.2303, 9.0.2305, 9.1.2308 (latest FedRAMP release), 9.1.2312, 9.2.2403

Was this topic useful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters