<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have a common field name for different sources. How do I view results from one source for this particular field name? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270582#M51941</link>
    <description>&lt;P&gt;I have common signature fields for both devices (Palo Alto and McAfee IPS) in the results. I just want to see the results from McAfee IPS signature filed.&lt;/P&gt;

&lt;P&gt;Please advise.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Oct 2016 15:47:55 GMT</pubDate>
    <dc:creator>rashid47010</dc:creator>
    <dc:date>2016-10-24T15:47:55Z</dc:date>
    <item>
      <title>I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270582#M51941</link>
      <description>&lt;P&gt;I have common signature fields for both devices (Palo Alto and McAfee IPS) in the results. I just want to see the results from McAfee IPS signature filed.&lt;/P&gt;

&lt;P&gt;Please advise.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 15:47:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270582#M51941</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2016-10-24T15:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270583#M51942</link>
      <description>&lt;P&gt;Both logs should have different sourcetype, so add mcafee IP specific sourcetype in your search (you can see the available sourcetypes of left field sidebar when you run the search).&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 15:50:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270583#M51942</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-24T15:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270584#M51943</link>
      <description>&lt;P&gt;thanks for quick reply, below is my query: &lt;/P&gt;

&lt;P&gt;index=paloalto_pa OR index=mcafee_ips src="2xx.xx.x.x1" | transaction src | stats count as "TOTAL_ATTEMPTS",values(dest) as DESTINATION,values(dest_translated_ip) as NATED_IP,values(threat_name),values(signature) by src&lt;/P&gt;

&lt;P&gt;for paloalto and mcafee IPS i have common signature field. For paloalto the thread_name(paloalto) gives me more value instead showing signature. &lt;BR /&gt;
now for mcafee IPS there is only signature field which is OK for me. now the results showing only signature field from paloalto not from mcafee IPS&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:32:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270584#M51943</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2020-09-29T11:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270585#M51944</link>
      <description>&lt;P&gt;Use&lt;BR /&gt;
index=your_index sourcetype=ips | ...&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe &lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 16:09:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270585#M51944</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2016-10-24T16:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270586#M51945</link>
      <description>&lt;P&gt;I got my required results.&lt;BR /&gt;
at this stage two things in my mind. &lt;/P&gt;

&lt;P&gt;1- for singature filed it shows me the signature values from both index/sourcetypes. I want to see the signature from only mcafee IPS&lt;/P&gt;

&lt;P&gt;2- how can I show the result where as both devices have different field name for result &lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 16:17:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270586#M51945</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2016-10-24T16:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: I have a common field name for different sources. How do I view results from one source for this particular field name?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270587#M51946</link>
      <description>&lt;P&gt;@rashid47010 - Just to clarify: Did cusello's suggestion of using &lt;CODE&gt;index=your_index sourcetype=ips | ...&lt;/CODE&gt; help get the "required results" to answer your question? &lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 03:46:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-have-a-common-field-name-for-different-sources-How-do-I-view/m-p/270587#M51946</guid>
      <dc:creator>aaraneta_splunk</dc:creator>
      <dc:date>2016-12-02T03:46:15Z</dc:date>
    </item>
  </channel>
</rss>

