<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to compare two results every week and display the differences from one index? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625971#M217581</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245096"&gt;@btluynk&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;always remember that Splunk isn't a database and the join command must be used only when you haven't any other solution because it's a very slow and resource consuming command.&lt;/P&gt;&lt;P&gt;Let me understand: you want to find the hostname in windows and in logsource, but if you use the condition checker=0, you always have results, what do you want really find: the list of hostanems every week?&lt;/P&gt;&lt;P&gt;Anyway, your original search can be done using stats in this way:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=windows_server source=AD_Enabled_Server) OR (index=logsource source="/root/xxx/aaa.txt")
| stats dc(index) AS index_count values(index) AS index BY hostname
| where index_count=1 AND index=windows&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;If instead you want to find the hostname in windows that are also in logsource, you can use :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows_server source=AD_Enabled_Server [ search index=logsource source="/root/xxx/aaa.txt") | fields hostname ]&lt;/LI-CODE&gt;&lt;P&gt;this search has only the limit of 50,000 results in the subsearch.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jan 2023 09:12:08 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-01-05T09:12:08Z</dc:date>
    <item>
      <title>How to compare two results every week and display the differences from one index?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625959#M217576</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;I want to compare two results every week and display the differences from one index. And I want create Jira ticket if the results are different.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 08:35:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625959#M217576</guid>
      <dc:creator>btluynk</dc:creator>
      <dc:date>2023-01-05T08:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two results every week and display the differences from one index?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625965#M217578</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245096"&gt;@btluynk&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if you already created the search, please share it, otherwise, please share the sample data highlighting&amp;nbsp; the fields to compare.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 08:46:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625965#M217578</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-05T08:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two results every week and display the differences from one index?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625966#M217579</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;Thanks for your response, for example;&lt;/P&gt;&lt;P&gt;index=windows_server source=AD_Enabled_Server |dedup hostname|eval checker=0 |join type=outer hostname [search index=logsource source="/root/xxx/aaa.txt" |eval checker=1]|table hostname,checker|search checker=0&lt;/P&gt;&lt;P&gt;Every week this search runs and I get the results. But if the result is different, I want to create a structure like open a ticket.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 08:58:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625966#M217579</guid>
      <dc:creator>btluynk</dc:creator>
      <dc:date>2023-01-05T08:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare two results every week and display the differences from one index?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625971#M217581</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245096"&gt;@btluynk&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;always remember that Splunk isn't a database and the join command must be used only when you haven't any other solution because it's a very slow and resource consuming command.&lt;/P&gt;&lt;P&gt;Let me understand: you want to find the hostname in windows and in logsource, but if you use the condition checker=0, you always have results, what do you want really find: the list of hostanems every week?&lt;/P&gt;&lt;P&gt;Anyway, your original search can be done using stats in this way:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=windows_server source=AD_Enabled_Server) OR (index=logsource source="/root/xxx/aaa.txt")
| stats dc(index) AS index_count values(index) AS index BY hostname
| where index_count=1 AND index=windows&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;If instead you want to find the hostname in windows that are also in logsource, you can use :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows_server source=AD_Enabled_Server [ search index=logsource source="/root/xxx/aaa.txt") | fields hostname ]&lt;/LI-CODE&gt;&lt;P&gt;this search has only the limit of 50,000 results in the subsearch.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 09:12:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-two-results-every-week-and-display-the/m-p/625971#M217581</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-05T09:12:08Z</dc:date>
    </item>
  </channel>
</rss>

