Splunk Search

Combining search based on field value

thampton
New Member

Hello all,

I have two search strings that pull information - one pulls all the blocked emails and the second pulls the emails blocked due to the rule it was blocked on and the file name. I would like to combine these searches so that the table has the additional "File Name" field whenever the rule the email is being blocked on is a certain value.

Search 1:

index=index_name sourcetype=sourcetype_name
| stats count by _time, email_domain, rule_name, email_ID

Search 2:

index=index_name sourcetype=sourcetype_name rule=hasFile file_name=*
| table _time, email_ID, file

Note:
Both searches have the email_ID that match and I've been trying to use that value to no avail. 

Thanks in advance for the assistance!

Labels (5)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Are both searches on the same index and sourcetype? If not, would a left join by email_ID be useful here?

The first search includes a count - is this still required and if so do you also want to count by file name as well?

 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...