Splunk Search

Additional search based off original search


I have a search similar to the following


(Index=myindex) or (index=otherindex)

| eval user=coalesce(accountname, id)

| mvexpand user

| stats values(field1) as field1, values(field2) as field2 by user


This gives me my results that I want but I want to now take the results of this to enrich information from the output by pulling other events from another index.  This will then generate an alert so nit being done pin a dashboard.


I could schedule a report and then reference something like a lookup table that wpuld probably work but I am trying to make it a bit more dynamic. I would like to maybe use the result from this and enrich with an ldap query but I dont think I can do that. Join is out of the question (limitations etc.) and I cant coalesce any further with other fields as they are in no way similar of even available.


Thoughts and thanks in advance.

Labels (3)
0 Karma


Have you looked into this app? https://splunkbase.splunk.com/app/1852/

This should allow you to pipe your results into an ldapsearch to enrich your results. 

0 Karma
Get Updates on the Splunk Community!

Cannot push config from deployer to search head cluster

Hello,I recently upgraded our deployer/deployment server from 8.1.6 to version 9.0 and when I try to push ...

Clear text password in command line

mogod command line argument having clear text password like "--sslPEMKeyPassword=password"how to avoid clear ...

Traffic logs from Splunk Add-on for Cisco Meraki

Recently deployed this add-on, but it doesn't seem to bring back Traffic or URL logs like we did when using ...