Splunk Search

Additional search based off original search


I have a search similar to the following


(Index=myindex) or (index=otherindex)

| eval user=coalesce(accountname, id)

| mvexpand user

| stats values(field1) as field1, values(field2) as field2 by user


This gives me my results that I want but I want to now take the results of this to enrich information from the output by pulling other events from another index.  This will then generate an alert so nit being done pin a dashboard.


I could schedule a report and then reference something like a lookup table that wpuld probably work but I am trying to make it a bit more dynamic. I would like to maybe use the result from this and enrich with an ldap query but I dont think I can do that. Join is out of the question (limitations etc.) and I cant coalesce any further with other fields as they are in no way similar of even available.


Thoughts and thanks in advance.

Labels (3)
0 Karma


Have you looked into this app? https://splunkbase.splunk.com/app/1852/

This should allow you to pipe your results into an ldapsearch to enrich your results. 

0 Karma
Get Updates on the Splunk Community!

Maximize the Value from Microsoft Defender with Splunk

<P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

<FONT size="5"><FONT size="5" color="#FF00FF">Get the latest news and updates from the Splunk Community ...