<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple sourcetypes with where condition in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638607#M221291</link>
    <description>&lt;P&gt;This is exactly what I tried but I need to see only events where cvs&amp;gt;7 and in the same row, in the same table I need to see data from the other sourcetype (operating_system, etc.).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I will make visualization.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My search without conditions:&lt;/P&gt;&lt;PRE&gt;index=security sourcetype=EDR:*  | eval dest=coalesce(ip,ipaddress) | stats values(sourcetype) values(cvs) values(warning) values(operating_system) values(ID) by dest &lt;/PRE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suspense_0-1680599076633.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24762i642E0095337D7150/image-size/medium?v=v2&amp;amp;px=400" role="button" title="suspense_0-1680599076633.png" alt="suspense_0-1680599076633.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Search with OR conditions:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;PRE&gt;index=security ( (sourcetype=EDR:Security cvs&amp;gt;7) OR sourcetype=EDR:Assets )&lt;/PRE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suspense_1-1680599155217.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24763iD28D1B26561234F4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="suspense_1-1680599155217.png" alt="suspense_1-1680599155217.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see if condition is met, I get results from one sourcetype only. If conditions are not met, I get all results i one row. I need to have it all - cvs&amp;gt;7, operating_system, ID, etc. in one row.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 04 Apr 2023 09:07:52 GMT</pubDate>
    <dc:creator>suspense</dc:creator>
    <dc:date>2023-04-04T09:07:52Z</dc:date>
    <item>
      <title>How can I see still results from both sourcetypes but only from hosts which have cvs score above 7?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638584#M221283</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=security sourcetype=EDR:*  | eval dest=coalesce(ip,ipaddress) | stats values(sourcetype) values(cvs) values(warning) values(operating_system) values(ID) by dest &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem:&lt;/P&gt;
&lt;P&gt;sourcetype contains two sourcetypes: EDR:Security EDS:Assets&lt;/P&gt;
&lt;P&gt;In Security I have fields ip, cvs, warning&lt;BR /&gt;In Assets I have fields ipaddress, operating_system, ID&lt;BR /&gt;&lt;BR /&gt;I use syntax above and I am happy as I see results from both sourcetypes.&amp;nbsp;&lt;BR /&gt;Now I need to see only results that have cvs above 7.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;&lt;STRONG&gt;problem&amp;nbsp;&lt;/STRONG&gt;is that whenever I user cvs&amp;gt;7 or&amp;nbsp; | search cvs&amp;gt;7 or |where cvs&amp;gt;7 I can see results from EDR:Security (so from sourcetype that I am looking for condition csv&amp;gt;7).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I see still results from both sourcetypes but only from hosts which have cvs score above 7?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 10:53:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638584#M221283</guid>
      <dc:creator>suspense</dc:creator>
      <dc:date>2023-04-04T10:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638588#M221285</link>
      <description>&lt;P&gt;I tried:&lt;BR /&gt;((sourcetype=EDR:* AND cvs&amp;gt;7) OR&amp;nbsp;sourcetype=EDR:*). But Even If I change cvs&amp;gt;100 I still get results with everything (all cvs, no matter what number it is... even if it is empty)&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 08:26:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638588#M221285</guid>
      <dc:creator>suspense</dc:creator>
      <dc:date>2023-04-04T08:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638593#M221287</link>
      <description>&lt;P&gt;Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=security (sourcetype=EDR:Security AND cvs&amp;gt;7) OR sourcetype=EDR:Assets
| eval dest=coalesce(ip,ipaddress)
| stats values(ip) as ip values(sourcetype) values(cvs) values(warning) values(operating_system) values(ID) by dest 
| where isnotnull(ip)&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 04 Apr 2023 08:42:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638593#M221287</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-04-04T08:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638595#M221288</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/251224"&gt;@suspense&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure I fully understand your request. If you want to show EDR:Security events where cvs &amp;gt; 7 and all EDR:Assets then you can do the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=security ( (sourcetype=EDR:Security cvs&amp;gt;7) OR sourcetype=EDR:Assets )&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 04 Apr 2023 08:45:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638595#M221288</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2023-04-04T08:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638605#M221290</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This query works for me to get all the values of more than 7. I reassign the name of "values(cvs) as cvs" before performing the where command.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=security sourcetype=EDR:* | eval dest=coalesce(ip,ipaddress) | stats values(sourcetype) as sourcetype values(cvs) as cvs values(warning) as warning values(operating_system) as operating_system values(ID) as ID by dest | where cvs&amp;gt;7&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are all the values after the stats.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Icecream123_0-1680598931038.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24760i4A51AEB7C250FCF1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Icecream123_0-1680598931038.png" alt="Icecream123_0-1680598931038.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after |where &amp;gt;7&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Icecream123_1-1680599041655.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24761i697163995822315B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Icecream123_1-1680599041655.png" alt="Icecream123_1-1680599041655.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this was what you were looking to do!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 09:05:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638605#M221290</guid>
      <dc:creator>Icecream123</dc:creator>
      <dc:date>2023-04-04T09:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638607#M221291</link>
      <description>&lt;P&gt;This is exactly what I tried but I need to see only events where cvs&amp;gt;7 and in the same row, in the same table I need to see data from the other sourcetype (operating_system, etc.).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I will make visualization.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My search without conditions:&lt;/P&gt;&lt;PRE&gt;index=security sourcetype=EDR:*  | eval dest=coalesce(ip,ipaddress) | stats values(sourcetype) values(cvs) values(warning) values(operating_system) values(ID) by dest &lt;/PRE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suspense_0-1680599076633.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24762i642E0095337D7150/image-size/medium?v=v2&amp;amp;px=400" role="button" title="suspense_0-1680599076633.png" alt="suspense_0-1680599076633.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Search with OR conditions:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;PRE&gt;index=security ( (sourcetype=EDR:Security cvs&amp;gt;7) OR sourcetype=EDR:Assets )&lt;/PRE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suspense_1-1680599155217.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24763iD28D1B26561234F4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="suspense_1-1680599155217.png" alt="suspense_1-1680599155217.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see if condition is met, I get results from one sourcetype only. If conditions are not met, I get all results i one row. I need to have it all - cvs&amp;gt;7, operating_system, ID, etc. in one row.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 04 Apr 2023 09:07:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638607#M221291</guid>
      <dc:creator>suspense</dc:creator>
      <dc:date>2023-04-04T09:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638609#M221292</link>
      <description>&lt;P&gt;Oh God! Thanks! That was the case, hah. I forgot to rename them and I put where at the end (which did not work)... Stupid mistake. Thanks again.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 09:10:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638609#M221292</guid>
      <dc:creator>suspense</dc:creator>
      <dc:date>2023-04-04T09:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple sourcetypes with where condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638610#M221293</link>
      <description>Glad to help!</description>
      <pubDate>Tue, 04 Apr 2023 09:11:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-see-still-results-from-both-sourcetypes-but-only-from/m-p/638610#M221293</guid>
      <dc:creator>Icecream123</dc:creator>
      <dc:date>2023-04-04T09:11:32Z</dc:date>
    </item>
  </channel>
</rss>

