Splunk Search

Compare 2 fields with differents queries

graziaedu
Explorer

I have the follow situation:

queryA returns correlations
AAA
BBB
CCC
DDD

queryB returns correlations 
AAA
CCC
EEE

Expect result is the queryA events with correlations AAA and CCC.

i need a query that compare the field correlation between them and if are equals show me the queryA events.

Thanks

0 Karma

bowesmana
SplunkTrust
SplunkTrust

You can also use the technique

(search1) OR (search2)
| stats values(*) as * by correlation_field
| where (condition)

the condition can then be based on your dataset, e.g. if search1 is sourcetype=A and search2 is sourcetype=B, then condition could be

| where mvcount(sourcetype)=2

because the stats values would have collected both sourcetypes to that field - if there is only one satisfying event correlation, then it is not included.

Another condition might be

| where isnotnull(field_from_search1) AND isnotnull(field_from_search2)

which is basically ensuring that a field from the data set 1 and data set 2 exists in the results.

 

 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It sounds like the set union command will do the job.  See https://docs.splunk.com/Documentation/Splunk/8.2.2/SearchReference/Set

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...