Splunk Search

Compare IP_address field in 2 indexes and ignore the data with the same values / or matches and display the rest.

learningnow
New Member

Want to run a report by comparing 2 indexes on " IP_Addresses" field.

Ignore any matching " IP addresses" (If IP are present in both indexes then ignore else display in query / report)
or
list any unique " IP addresses" in either index (If present in one but not in one of the other index)

in last 7 days.

Thanks in advance.

0 Karma
1 Solution

renjith_nair
Legend

@learningnow ,

Try

(index=1 OR index=2) | stats dc(index) as count by IP_Addresses|where count < 2
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@learningnow ,

Try

(index=1 OR index=2) | stats dc(index) as count by IP_Addresses|where count < 2
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...