Splunk Search

Compare identical fields from 2 searches

bigrichie90
Path Finder

I have 2 searches which I appended and I am trying to search based on a matching session ID (to find details of a remote session). For some reason the values are not matching and returns 0 results. However, when I manually type in the session it works correctly.

One more question, there are 2 rows that come up since I am appending searches. How can I combine both rows into one?

Here is my query. . . first query is bolded for readability as well as tail end that apply to both searches.

sourcetype=uag user=bigrichie90 action=added | eval sessionAdded=session | head 1
| append [search sourcetype=uag user=bigrichie90 action=removed | eval sessionRemoved=session |head 1 ]
| where sessionAdded==sessionRemoved

0 Karma

sk314
Builder

Use "join" command like so:

sourcetype=uag user=bigrichie90 action=added | eval sessionAdded=session | head 1
    | join session [search sourcetype=uag user=bigrichie90 action=removed | eval sessionRemoved=session |head 1 ] 
    | where sessionAdded==sessionRemoved

Since you can specify the exact field to join on, you don't even need the eval statements. The following statement should do just fine.

sourcetype=uag user=bigrichie90 action=added | join session [search sourcetype=uag user=bigrichie90 action=removed ] 

For more information: http://docs.splunk.com/Documentation/Splunk/6.1.3/SearchReference/Join

0 Karma

sk314
Builder

Yes, It is expensive. You could try using transaction, like so:

sourcetype=uag user=bigrichie90 | transaction session 

If you need more information on event grouping and correlation:
http://docs.splunk.com/Documentation/Splunk/6.1.3/Search/Abouteventcorrelation

Also, this flowchart when in doubt! 🙂

http://docs.splunk.com/File:Search_event_grouping_flowchart.png

Jeff_Lightly_Sp
Communicator

Thanks for the flowchart link - this will come in handy!

0 Karma

bigrichie90
Path Finder

Wouldn't join impact performance? I was trying to stay away from joining.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...