<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search multiple indexes for the same value under different field names? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264955#M79615</link>
    <description>&lt;P&gt;I doubt its a data issue... but some more help here for you.&lt;/P&gt;

&lt;P&gt;When you run the search you can click on "job" drop down, then click on "inspect job", then look at "normalized search".  It should look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;litsearch index=main ( ( component="ExecProcessor" ) OR ( component="HttpPubSubConnection" ) OR ( component="HttpPubSubConnection" ) OR ( component="Metrics" ) OR ( component="Metrics" ) ) | fields keepcolorder=t "*" "_bkt" "_cd" "_si" "host" "index" "linecount" "source" "sourcetype" "splunk_server"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or similar if you run a subsearch like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=main [search index=_internal component=* | head 5 | table component]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You'll see where it's adding a large OR clause to the main search.&lt;/P&gt;

&lt;P&gt;Now if the subsearch returns 0 results then the normalized search will look like this instead:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;litsearch NOT () | fields keepcolorder=t "*" "_bkt" "_cd" "_si" "host" "index" "linecount" "source" "sourcetype" "splunk_server"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And that's obviously borked.&lt;/P&gt;

&lt;P&gt;Try the approach above and see if you can spot the error in your normalized search.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2016 15:57:44 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2016-06-06T15:57:44Z</dc:date>
    <item>
      <title>How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264929#M79589</link>
      <description>&lt;P&gt;Scenario:   Ultimately, I would like to create an alert for an event in index A. Then I would like the alert to kickoff a search on index B based on a field value in index A. The value in index A and index B is the same, however, the fields are different. As this is a complex question, I would like to focus on using the field value of FieldA in index A to search for FieldB in index B.  &lt;/P&gt;

&lt;P&gt;Here is the logic I would like the search to follow:  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index = A sourcetype = a Auser = *

index = B sourcetype = b Buser = Auser
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thank you for your help.&lt;BR /&gt;
(hopefully it makes sense)&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 18:12:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264929#M79589</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-25T18:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264930#M79590</link>
      <description>&lt;P&gt;index=B sourcetype=b [ search index=a sourcetype=a Auser=* | dedup Auser| fields Auser ]&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 18:24:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264930#M79590</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-25T18:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264931#M79591</link>
      <description>&lt;P&gt;Thank you for the response, however not quite there yet.&lt;/P&gt;

&lt;P&gt;index=B sourcetype=b [search  index=a sourcetype=a Auser=* | dedup Auser| fields Auser ]&lt;/P&gt;

&lt;P&gt;I added "search" in the brackets.   I think this will work but I have to rex Auser to the common format.  &lt;/P&gt;

&lt;P&gt;I will let you know how your code works asap.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 19:14:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264931#M79591</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-25T19:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264932#M79592</link>
      <description>&lt;P&gt;I am going to throw a curve ball now making the question more challenging.&lt;/P&gt;

&lt;P&gt;Auser  and Buser are not natively in the same format.&lt;/P&gt;

&lt;P&gt;I have to use &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;rex field=Auser "(?&amp;lt;sender&amp;gt;\w+@\w+\.\w+)"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;to match Buser format.     &lt;/P&gt;

&lt;P&gt;They are both email addresses  e.g.    &lt;A href="mailto:someone@somedomain.tdl"&gt;someone@somedomain.tdl&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Currently I am having no luck inserting the rex into your code.   &lt;/P&gt;

&lt;P&gt;Any help is appreciated.&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 19:25:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264932#M79592</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-25T19:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264933#M79593</link>
      <description>&lt;P&gt;just to clarify,  I am trying to find the results from &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[search index=A sourcetype=a Auser=* | dedup Auser | fields Auser |rex field=Auser "(?&amp;lt;sender&amp;gt;\w+@\w+\.\w+)"  | stats list(sender)]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in index= B&lt;/P&gt;

&lt;P&gt;The previous code gives me a list of results, in this case email addresses.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 19:40:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264933#M79593</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-25T19:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264934#M79594</link>
      <description>&lt;P&gt;Your regex is not capturing the user but the entire email address... we might also take to lowercase to help...  I left out search but also forgot to rename it as Buser too.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=B sourcetype=b [ search index=a sourcetype=a Auser=* | fields Auser | dedup Auser | rex field=Auser "(?&amp;lt;sender&amp;gt;\w+)@\w+\.\w+" | eval Buser=lower(sender) ]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 25 May 2016 20:12:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264934#M79594</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-25T20:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264935#M79595</link>
      <description>&lt;P&gt;Unfortunately I am having no luck.   But I think we are close.&lt;/P&gt;

&lt;P&gt;The following gives the result "sender" which is the field in index=B  that I want to search.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=A sourcetype=a Auser=*   |rex field=Auser "(?&amp;lt;sender&amp;gt;\w+@\w+\.\w+)"  | stats list(sender)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So if I could get the proper syntax to add this subsearch results to index=B, I think we are golden.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 15:38:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264935#M79595</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T15:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264936#M79596</link>
      <description>&lt;P&gt;This should give a field called Buser which is the email sender... correct?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  search index=A sourcetype=a Auser=* | fields Auser | dedup Auser | rex field=Auser "(?&amp;lt;sender&amp;gt;\w+)@\w+\.\w+" | eval Buser=lower(sender) | table Buser
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;if so it should work fine here&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=B sourcetype=b [ search index=a sourcetype=a Auser=* | fields Auser | dedup Auser | rex field=Auser "(?&amp;lt;sender&amp;gt;\w+)@\w+\.\w+" | eval Buser=lower(sender) | table Buser ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;assuming the name of the user field in index B is Buser...   change the eval to be userNameFieldInIndexB=sender  maybe?&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 15:45:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264936#M79596</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-26T15:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264937#M79597</link>
      <description>&lt;P&gt;Maybe it will help if you give me the correct index names, sourcetype names and field names so I can give you the solution without you interpreting what I'm trying to tell you.???&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 15:46:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264937#M79597</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-26T15:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264938#M79598</link>
      <description>&lt;P&gt;I wish I could give the "actual" code however I am not permitted for security reasons, however you are correct here:&lt;/P&gt;

&lt;P&gt;in index= A  the field is actually "suser" and it gets converted to sender, which is the field in index=B that I am looking for.&lt;/P&gt;

&lt;P&gt;In other words,  in index=A   I convert suser to an email address like &lt;A href="mailto:someone@somedomain.tld"&gt;someone@somedomain.tld&lt;/A&gt;  as sender.   "sender" is the field in index=B  that I am trying to find all matches.   I will let you know if I can get your latest code to work.&lt;BR /&gt;&lt;BR /&gt;
Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 17:22:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264938#M79598</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T17:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264939#M79599</link>
      <description>&lt;P&gt;so in the second search... change the "eval Buser=lower(sender) | table Buser" to be "eval FieldNameInIndexB=lower(sender) | table FieldNameInIndexB"&lt;/P&gt;

&lt;P&gt;What is happening is the subsearch (second search) is sending values for FieldNameInIndexB back and separating them with ORs so that they look like this on the main search&lt;/P&gt;

&lt;P&gt;index=B sourcetype=b (FieldNameInIndexB=asdf OR FieldNameInIndexB=asdfasdf OR FieldNameInIndexB=234asd) &lt;/P&gt;

&lt;P&gt;where FieldNameInIndexB is whatever we have in that last table command within the subsearch.   the lower(sender) is there to force lowercase on sender and may not be require or desired.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 17:28:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264939#M79599</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-26T17:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264940#M79600</link>
      <description>&lt;P&gt;not getting it to work, maybe b/c the sender field is common to index A and index B?&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 17:31:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264940#M79600</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T17:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264941#M79601</link>
      <description>&lt;P&gt;ok, I can give you this as index=A&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?&amp;lt;attacker&amp;gt;\w+@\w+\.\w+)" | stats list(*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;this code works, and I changed the field name to attacker&lt;/P&gt;

&lt;P&gt;I can give you this as index=B&lt;/P&gt;

&lt;P&gt;index=mail sourcetype="xmail:textmail"   and the field of interest is "sender"&lt;/P&gt;

&lt;P&gt;I hope that helps&lt;/P&gt;

&lt;P&gt;Now what I was thinking is using a subsearch as transactions and joins are expensive so,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail sourcetype="xmail:textmail" [search index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?&amp;lt;attacker&amp;gt;\w+@\w+\.\w+)" | stats list(*)]  | eval sender = attacker
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but this does not work&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 17:44:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264941#M79601</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T17:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264942#M79602</link>
      <description>&lt;P&gt;index=mail sourcetype="xmail:textmail" [search index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?\w+@\w+.\w+)" |eval sender=attacker | fields sender] &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:48:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264942#M79602</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T09:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264943#M79603</link>
      <description>&lt;P&gt;but problem is you're getting full email address and you said you want everything before @ as the attacker.&lt;/P&gt;

&lt;P&gt;index=mail sourcetype="xmail:textmail" [search index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?\w+)@\w+.\w+" | eval sender=attacker | fields sender] &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:48:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264943#M79603</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T09:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264944#M79604</link>
      <description>&lt;P&gt;index=mail sourcetype="xmail:textmail" [search index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?\w+)@\w+.\w+" | eval sender=attacker | fields sender]  &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:48:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264944#M79604</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T09:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264945#M79605</link>
      <description>&lt;P&gt;We have to start a new thread now because of too many comments:&lt;/P&gt;

&lt;P&gt;You said you need everything before the @ in email address to be the sender/attacker, so here is the correct way to capture that with rex.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; `index=mail sourcetype="xmail:textmail" [search index=main sourcetype=X_cef_syslog eventtype=X suser=* |rex field=suser "(?&amp;lt;sender&amp;gt;\w+)@\w+.\w+" | fields sender] `
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 26 May 2016 19:38:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264945#M79605</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-26T19:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264946#M79606</link>
      <description>&lt;P&gt;my indexer crashed, I will let you know how it goes.  Thanks for the reply.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 20:13:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264946#M79606</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T20:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264947#M79607</link>
      <description>&lt;P&gt;Put your new comments here. the other thread is too long and comments wont stay...&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 20:19:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264947#M79607</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2016-05-26T20:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to search multiple indexes for the same value under different field names?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264948#M79608</link>
      <description>&lt;P&gt;Sorry, for making you do some hard work here.  Actually, I need the whole email address for sender and suser.&lt;/P&gt;

&lt;P&gt;To recap,  the suser field is not natively in a clean &lt;A href="mailto:someone@somedomain.tld"&gt;someone@somedomain.tld&lt;/A&gt; format, that is why I rex.   After using the &lt;CODE&gt;|rex field=suser "(?&amp;lt;attacker&amp;gt;\w+@\w+\.\w+)"&lt;/CODE&gt;   then the format of suser [attacker] is the same as sender in &lt;CODE&gt;index=mail sourcetype="xmail:textmail"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;does that make sense?   &lt;/P&gt;

&lt;P&gt;The step I have trouble with is using the subsearch results to trigger a search for sender in the index =mail&lt;/P&gt;

&lt;P&gt;I hope this clears things up&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 21:30:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-multiple-indexes-for-the-same-value-under/m-p/264948#M79608</guid>
      <dc:creator>packet_hunter</dc:creator>
      <dc:date>2016-05-26T21:30:40Z</dc:date>
    </item>
  </channel>
</rss>

