<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Compare Two Fields with different Names on different Index in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402354#M4600</link>
    <description>&lt;P&gt;you're welcome !&lt;/P&gt;</description>
    <pubDate>Sun, 21 Jul 2019 14:52:05 GMT</pubDate>
    <dc:creator>DavidHourani</dc:creator>
    <dc:date>2019-07-21T14:52:05Z</dc:date>
    <item>
      <title>Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402349#M4595</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;

&lt;P&gt;i have 2 Index index a and index b &lt;BR /&gt;
on index a i have a field called nachrichtId&lt;BR /&gt;
on index b i have a field called originalId&lt;BR /&gt;
this both fields have the Same string (Value)&lt;/P&gt;

&lt;P&gt;i want to write now a Search where i can found out if i have some nachrichtId events on Index a but no originalId on index b.&lt;/P&gt;

&lt;P&gt;I want to find out if i have some problems with my Events or if i have a gap between this 2 Indexes&lt;/P&gt;

&lt;P&gt;can anyone help me please Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 13:22:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402349#M4595</guid>
      <dc:creator>mklhs</dc:creator>
      <dc:date>2019-07-21T13:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402350#M4596</link>
      <description>&lt;P&gt;Hi @mklhs,&lt;/P&gt;

&lt;P&gt;If you're value is already in a field lets call it &lt;CODE&gt;field_value&lt;/CODE&gt; you can run a search as follows :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index= nachrichtId OR index=originalId
| stats dc(index) as condition by field_value
| where condition&amp;lt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If the value is not extracted and its the whole event you wish to compare then you can use the &lt;CODE&gt;_raw&lt;/CODE&gt; field:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index= nachrichtId OR index=originalId
| stats dc(index) as condition by _raw
| where condition&amp;lt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Let me know if that helps.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 13:58:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402350#M4596</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-07-21T13:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402351#M4597</link>
      <description>&lt;P&gt;Thank for your Answer but i dont know if  this is right for me&lt;/P&gt;

&lt;P&gt;I have 2 indexes&lt;BR /&gt;
in index 1 i have an event with a field named Nachrichtentid&lt;BR /&gt;
this field has the value foobar&lt;BR /&gt;
in index 2 i have an event with a field named OriginalId&lt;BR /&gt;
this field also has the value foobar&lt;/P&gt;

&lt;P&gt;I want to find out which events are not forwarded by index 1 and index 2, so where events are missing here. In both indexes the events have only these 2 fields as unique value.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 14:07:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402351#M4597</guid>
      <dc:creator>mklhs</dc:creator>
      <dc:date>2019-07-21T14:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402352#M4598</link>
      <description>&lt;P&gt;First you need to make sure that this ID has the same name in both indexes to make it easier to join without using the &lt;CODE&gt;join&lt;/CODE&gt; command. So first create an alias, call it &lt;CODE&gt;joinID&lt;/CODE&gt; or something. Then run the search below : &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=index1 OR index=index2
 | stats dc(index) as condition by joinID
 | where condition&amp;lt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will fetch data from both indexes and see which ID is in less than 2 indexes. &lt;/P&gt;

&lt;P&gt;If you also wish to know which index has the missing event, you can run the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=index1 OR index=index2
 | stats dc(index) as condition, values(index) as index by joinID
 | where condition&amp;lt;2
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 21 Jul 2019 14:20:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402352#M4598</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-07-21T14:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402353#M4599</link>
      <description>&lt;P&gt;Thats works for me Thank you for your Help&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 14:42:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402353#M4599</guid>
      <dc:creator>mklhs</dc:creator>
      <dc:date>2019-07-21T14:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Compare Two Fields with different Names on different Index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402354#M4600</link>
      <description>&lt;P&gt;you're welcome !&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 14:52:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Compare-Two-Fields-with-different-Names-on-different-Index/m-p/402354#M4600</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-07-21T14:52:05Z</dc:date>
    </item>
  </channel>
</rss>

