<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query Help in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Query-Help/m-p/485133#M193532</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying to search logs from specific source and with specific name and to search IP found in previous search in all indexes.&lt;/P&gt;

&lt;P&gt;Ex: index=firewall and name="malicious IP' (this will give a log with IP address and I want to search that IP address in all indexes.&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;BR /&gt;
Bests,&lt;BR /&gt;
Gozde&lt;/P&gt;</description>
    <pubDate>Thu, 14 Nov 2019 13:29:09 GMT</pubDate>
    <dc:creator>gozdeyildiz</dc:creator>
    <dc:date>2019-11-14T13:29:09Z</dc:date>
    <item>
      <title>Query Help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Help/m-p/485133#M193532</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying to search logs from specific source and with specific name and to search IP found in previous search in all indexes.&lt;/P&gt;

&lt;P&gt;Ex: index=firewall and name="malicious IP' (this will give a log with IP address and I want to search that IP address in all indexes.&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;BR /&gt;
Bests,&lt;BR /&gt;
Gozde&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 13:29:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Help/m-p/485133#M193532</guid>
      <dc:creator>gozdeyildiz</dc:creator>
      <dc:date>2019-11-14T13:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Query Help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Help/m-p/485134#M193533</link>
      <description>&lt;P&gt;Hi @gozdeyildiz,&lt;BR /&gt;
please try something like this (if the field is called IP in every index:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* [ search index=firewall name="malicious IP" | fields IP ]
| ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you cannot be sure that IP field has the same name in every index, you could try something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* [ search index=firewall name="malicious IP" | rename IP AS query | fields query ]
| ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In both the searches check if the number of results of subsearch is more or less than 50,000, because there's this limit in subsearches.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 13:53:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Help/m-p/485134#M193533</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2019-11-14T13:53:31Z</dc:date>
    </item>
  </channel>
</rss>

