<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pull Different Fields from another Sourcetype in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480690#M143005</link>
    <description>&lt;P&gt;I can make queries with only sample logs.&lt;BR /&gt;
You have explained, but it is assumed that I know the log.&lt;BR /&gt;
 I basically don't know  the system and logs outputs.&lt;BR /&gt;
Does not presenting a log mean that you don't need help from someone who doesn't know the log? Then I'm useless.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Feb 2020 08:18:16 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-02-29T08:18:16Z</dc:date>
    <item>
      <title>Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480687#M143002</link>
      <description>&lt;P&gt;I'm having to search across two indexes and am looking for a particular string of text, called "sampletext"&lt;/P&gt;

&lt;P&gt;Example:&lt;BR /&gt;
index=sso sourcetype="ping*" "my sampletext here"&lt;/P&gt;

&lt;P&gt;Now, I would also like to search the sourecetype=Active Directory for two of its fields as I would like to include Active Directories department and description fields to my query:&lt;/P&gt;

&lt;P&gt;Example:&lt;BR /&gt;
index=msad sourcetype=ActiveDirectory department=* description=*&lt;/P&gt;

&lt;P&gt;The problem is it's not pulling the Active Directory fields because I am searching for a particular string of text "sampletext" and it's only pulling back the fields under the sso index.&lt;/P&gt;

&lt;P&gt;How do I pull the event data that contains the string text under index=sso AND pull the Active Directory fields, department and description under those events too?  Is this possible?&lt;/P&gt;

&lt;P&gt;Any help is greatly appreciated! &lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 23:03:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480687#M143002</guid>
      <dc:creator>itsmevic</dc:creator>
      <dc:date>2020-02-28T23:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480688#M143003</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;index=msad sourcetype=ActiveDirectory department=* description=* [ search index=sso sourcetype="ping*" "my sampletext here" 
| return $fieldname_has_sample_text]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;this sub search returns  only one event. If there is many events, change &lt;CODE&gt;return&lt;/CODE&gt; option.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 23:58:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480688#M143003</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-28T23:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480689#M143004</link>
      <description>&lt;P&gt;Hi to4kawa, thank you for providing your suggestion.  I've adjusted the SPL a little bit and it is now looking at both indexes as well as multiple sourcetypes. I can see in the fields sidebar the fields from both indexes.  I know just need to pipe it out into a report.  Unfortunately, It will only pipe out "UserName and Workstation", both of which are fields that reside under the index=sso and not the index=msad.  &lt;/P&gt;

&lt;P&gt;(index="sso" sourcetype="ping*" UserName="&lt;EM&gt;" Workstation="&lt;/EM&gt;" "NTLMSSP principal: DomainName= UserName") OR (index="msad" sourcetype=ActiveDirectory description="*")&lt;BR /&gt;
| stats count by UserName,Workstation&lt;BR /&gt;
| sort -count&lt;/P&gt;

&lt;P&gt;I see the description and department fields in the fields sidebar but when I try and incorporate them into the |stats command, they aren't appearing.  &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:22:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480689#M143004</guid>
      <dc:creator>itsmevic</dc:creator>
      <dc:date>2020-09-30T04:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480690#M143005</link>
      <description>&lt;P&gt;I can make queries with only sample logs.&lt;BR /&gt;
You have explained, but it is assumed that I know the log.&lt;BR /&gt;
 I basically don't know  the system and logs outputs.&lt;BR /&gt;
Does not presenting a log mean that you don't need help from someone who doesn't know the log? Then I'm useless.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 08:18:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480690#M143005</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-29T08:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480691#M143006</link>
      <description>&lt;P&gt;Am I missing something obvious?&lt;BR /&gt;
would this not work?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;(index=sso sourcetype="ping*") OR (index=msad sourcetype=ActiveDirectory department=* description=*)|search "my sample text"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 09:35:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480691#M143006</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2020-02-29T09:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480692#M143007</link>
      <description>&lt;P&gt;Hi, @nickhillscpl &lt;BR /&gt;
&lt;CODE&gt;(index=sso sourcetype="ping*") OR (index=msad sourcetype=ActiveDirectory department=* description=*)| "my sample text"&lt;/CODE&gt;&lt;BR /&gt;
up to here.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 09:49:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480692#M143007</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-29T09:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pull Different Fields from another Sourcetype</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480693#M143008</link>
      <description>&lt;P&gt;What I ended up doing was [search index=...] within the other index of my search and with a little tweaking and peaking was able to pull the data I needed.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 01:56:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Pull-Different-Fields-from-another-Sourcetype/m-p/480693#M143008</guid>
      <dc:creator>itsmevic</dc:creator>
      <dc:date>2020-03-03T01:56:59Z</dc:date>
    </item>
  </channel>
</rss>

