<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What's the best way to find out events that have field values that DO NOT match? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641774#M222313</link>
    <description>&lt;P&gt;I have two lookups: one is the scan results from the current week and the other is historical lookup of scan results from the weeks prior. Each event is the scan results for a host (fields DNS IP). I have a field called called Host_Auth that can have of the following field values:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Windows Successful&lt;/LI&gt;&lt;LI&gt;Windows Failure&lt;/LI&gt;&lt;LI&gt;Unix Failed&lt;/LI&gt;&lt;LI&gt;Unix Successful&lt;/LI&gt;&lt;LI&gt;Unix Timeout&lt;/LI&gt;&lt;LI&gt;Windows Not Attempted&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Unix Not Attempted&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Unknown&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would like to create a search where the first lookup is compered against the second lookup and return events where the Host_Auth field value is is different.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried a join type=left Host_Auth but that didn't quite work&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Apr 2023 16:31:36 GMT</pubDate>
    <dc:creator>atebysandwich</dc:creator>
    <dc:date>2023-04-28T16:31:36Z</dc:date>
    <item>
      <title>What's the best way to find out events that have field values that DO NOT match?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641774#M222313</link>
      <description>&lt;P&gt;I have two lookups: one is the scan results from the current week and the other is historical lookup of scan results from the weeks prior. Each event is the scan results for a host (fields DNS IP). I have a field called called Host_Auth that can have of the following field values:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Windows Successful&lt;/LI&gt;&lt;LI&gt;Windows Failure&lt;/LI&gt;&lt;LI&gt;Unix Failed&lt;/LI&gt;&lt;LI&gt;Unix Successful&lt;/LI&gt;&lt;LI&gt;Unix Timeout&lt;/LI&gt;&lt;LI&gt;Windows Not Attempted&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Unix Not Attempted&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Unknown&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would like to create a search where the first lookup is compered against the second lookup and return events where the Host_Auth field value is is different.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried a join type=left Host_Auth but that didn't quite work&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 16:31:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641774#M222313</guid>
      <dc:creator>atebysandwich</dc:creator>
      <dc:date>2023-04-28T16:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: What's the best way to find out events that have field values that DO NOT match?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641783#M222315</link>
      <description>&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;join&lt;/FONT&gt; command pairs events with the same values of the specified field.&amp;nbsp; It cannot be used to find differences.&lt;/P&gt;&lt;P&gt;To find differences, join events using another field (DNS, perhaps) then filter on the Host_Auth field.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;&amp;lt;search 1&amp;gt;&amp;gt;
| rename Host_Auth as Host_Auth_1
| join type=left DNS [ &amp;lt;&amp;lt;search 2&amp;gt;&amp;gt; | rename Host_Auth as Host_Auth_2 ]
| where Host_Auth_1 != Host_Auth_2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;My standard disclaimer applies: &lt;FONT face="courier new,courier"&gt;join&lt;/FONT&gt; is inefficient so consider using &lt;FONT face="courier new,courier"&gt;append&lt;/FONT&gt; or another method of combining results.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 17:20:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641783#M222315</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-04-28T17:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: What's the best way to find out events that have field values that DO NOT match?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641805#M222327</link>
      <description>&lt;P&gt;To build on&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;'s disclaimer&lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;, here's a possible alternative&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(&amp;lt;&amp;lt;sourcetype=sourcetyp1 search 1&amp;gt;&amp;gt;) OR (&amp;lt;&amp;lt;sourcetype=sourcetype2 search 2&amp;gt;&amp;gt;) ``` replace sourcetype with any field that differentiates search 1 from search 2 ```
| eventstats dc(sourcetype) as sourcetypes by DNS Host_Auth
| where sourcetypes == 1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 23:05:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641805#M222327</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-04-28T23:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: What's the best way to find out events that have field values that DO NOT match?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641881#M222355</link>
      <description>&lt;P&gt;This worked exactly as I was hoping. I changed the join to be looking for IP rather than DNS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the help on this!&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 13:41:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-s-the-best-way-to-find-out-events-that-have-field-values/m-p/641881#M222355</guid>
      <dc:creator>atebysandwich</dc:creator>
      <dc:date>2023-05-01T13:41:27Z</dc:date>
    </item>
  </channel>
</rss>

