Splunk Search

Combine multiple search fields

jbanAtSplunk
Communicator

Hi, 

We have a scenario where we have three different events that should combine together based on Event ID.  

Example 

Event 1 Fields: 

  • Hostname 
  • Unique_ID 
  • Has_Vulnerabilities 

 Event 2 Fields: 

  • Scan_Date 
  • Hostname_Unique_ID 
  • Vulnerability_Id 

 Event 3 Fields: 

  • Vulnerability_id 
  • Description 
  • Start_Date 
  •  

What we are trying to do is, when I click on “Event 1 Unique_ID” to get all Vulnerabilities for Selected Host for “Event 2” enriched with selected data from “Event 3”. 

All three events are in the same index but different sourcetype.  

What is the best approach here? Subsearch seems slow If I go “Event 2” first and then filter to “Event 1”. I want another way around.  

Labels (2)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Can you clarify if you want an dashboard (as you are talking about clicks) and drill down to those events by individual hosts or do you want one query which contains all that info?

I suppose that Hostname == Hostname_Unique_ID or is there some other field on event 1 to match those?

r. Ismo

0 Karma

jbanAtSplunk
Communicator

Eventually I will create dashboard. For now, search is enough just to get me going 🙂

we can use hostname=hostname_unique_id

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...