<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: multisearch in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468652#M191945</link>
    <description>&lt;P&gt;which query did you tried? what is your sample output till now and what output you are expecting?&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jun 2020 17:37:57 GMT</pubDate>
    <dc:creator>493669</dc:creator>
    <dc:date>2020-06-02T17:37:57Z</dc:date>
    <item>
      <title>multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468640#M191933</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;

&lt;P&gt;couple hours i am trying to get:&lt;BR /&gt;
i have one log with no similar way of words in one line... because of that i cannot get in one search what i need.&lt;BR /&gt;
This two searches get what i need:&lt;BR /&gt;
index=ise "authentication failed" "Administrator-Login"&lt;BR /&gt;
index=ise "authentication failed" "UserName"&lt;BR /&gt;
Now i want this two query to join in one and get results which admin login and user login have authentication failed...&lt;/P&gt;

&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:34:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468640#M191933</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T16:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468641#M191934</link>
      <description>&lt;P&gt;Can you try something like this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ise authentication="failed" Administrator="Login"
| table UserName
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I suggest adding a sourcetype to the search as well in the future.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:40:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468641#M191934</guid>
      <dc:creator>wedge22</dc:creator>
      <dc:date>2020-06-02T16:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468642#M191935</link>
      <description>&lt;P&gt;How about this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ise "authentication failed" ("Administrator-Login" OR "UserName")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:42:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468642#M191935</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-06-02T16:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468643#M191936</link>
      <description>&lt;P&gt;this cannot be done, because logs are like syslog, and cannot search by that fields .. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:45:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468643#M191936</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T16:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468644#M191937</link>
      <description>&lt;P&gt;in that query, i don`t see administrator logins... &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:45:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468644#M191937</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T16:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468645#M191938</link>
      <description>&lt;P&gt;can you try-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ise  ("authentication failed" "Administrator-Login") OR ("authentication failed" "UserName")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:00:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468645#M191938</guid>
      <dc:creator>493669</dc:creator>
      <dc:date>2020-06-02T17:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468646#M191939</link>
      <description>&lt;P&gt;seems that`s what i need, how now to sort it by count?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:06:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468646#M191939</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T17:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468647#M191940</link>
      <description>&lt;P&gt;try below-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...|sort 0 - count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:08:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468647#M191940</guid>
      <dc:creator>493669</dc:creator>
      <dc:date>2020-06-02T17:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468648#M191941</link>
      <description>&lt;P&gt;yes that and make it like table, to visualize instead to show logs?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:11:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468648#M191941</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T17:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468649#M191942</link>
      <description>&lt;P&gt;to show in tabular format use table command and then specify your field names-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...|table fieldname
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...|table *
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:17:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468649#M191942</guid>
      <dc:creator>493669</dc:creator>
      <dc:date>2020-06-02T17:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468650#M191943</link>
      <description>&lt;P&gt;Use the &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| table 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to create a table of any fields you are interested in, the results from the search should provide interesting fields on the left of the search panel, then use &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| sort
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:18:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468650#M191943</guid>
      <dc:creator>wedge22</dc:creator>
      <dc:date>2020-06-02T17:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468651#M191944</link>
      <description>&lt;P&gt;nope, whatever i done, cannot get it...&lt;BR /&gt;
what about multisearch?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:32:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468651#M191944</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T17:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468652#M191945</link>
      <description>&lt;P&gt;which query did you tried? what is your sample output till now and what output you are expecting?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:37:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468652#M191945</guid>
      <dc:creator>493669</dc:creator>
      <dc:date>2020-06-02T17:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468653#M191946</link>
      <description>&lt;P&gt;hm, seems this is fine:&lt;BR /&gt;
index=ise  ("authentication failed" "Administrator-Login") OR ("authentication failed" "UserName") &lt;BR /&gt;
 |  table AdminName UserName &lt;BR /&gt;
|  sort 0 - count&lt;/P&gt;

&lt;P&gt;now i need instead couple same usernames in list, to be just counted, not repeated ...&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:38:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468653#M191946</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T17:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468654#M191947</link>
      <description>&lt;P&gt;if you want to count by UserName and AdminName&lt;BR /&gt;
then try-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...|stats count by UserName AdminName
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:45:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468654#M191947</guid>
      <dc:creator>493669</dc:creator>
      <dc:date>2020-06-02T17:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468655#M191948</link>
      <description>&lt;P&gt;with that 0 score.&lt;BR /&gt;
With only  "stats count by UserName" i see all except admin accounts...&lt;BR /&gt;
so now, i need only more  to show/include admin count..&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:48:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468655#M191948</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T17:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468656#M191949</link>
      <description>&lt;P&gt;which seems impossible and because of that i want to try multi search option?&lt;BR /&gt;
but never used...&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 18:23:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468656#M191949</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T18:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: multisearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468657#M191950</link>
      <description>&lt;P&gt;succeeded with:&lt;BR /&gt;
index=ise  ("authentication failed" "Administrator-Login") OR ("authentication failed" "UserName") &lt;BR /&gt;
| stats count by UserName &lt;BR /&gt;
|  append &lt;BR /&gt;
    [search index=ise ("authentication failed" "Administrator-Login") OR ("authentication failed" "UserName") &lt;BR /&gt;
| stats count by AdminName]&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 19:23:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/multisearch/m-p/468657#M191950</guid>
      <dc:creator>vmicovic2</dc:creator>
      <dc:date>2020-06-02T19:23:01Z</dc:date>
    </item>
  </channel>
</rss>

