Splunk Search

Comparing two field values for !=

himynamesdave
Contributor

I'm trying to create a search comparing then validating two fields in Splunk... but struggling.

My first search uses a lookup to add a field called sha256 to an event (what I'm doing is adding a hash to an event):

source="syslog.log" | lookup sha256 raw as _raw | fields sha256

I also have a set of the same events indexed in Splunk with the hashes already writtern under a field called: event_hash.

source="syslog-prehash.log" | fields event_hash

Note: Although we have two sets of the same events (lookup hash [syslog.log] / pre-hashed [syslog-prehas.log]) the event timestamps are slightly different because of the ways the pre-hashed events are written and indexed.

Now I want to compare the field sha256 [syslog.log] and event_hash [syslog-prehash.log] to see if there are any hashes that do not match.

As the fields (hashes) are alphanumeric I am struggling to find a way to do this. I'm thinking I could join the two searches and pipe a where command looking for hashes that only appear once (to show hashes that have no matches).

Does anyone have any suggestions on a better way to write this search?

Thanks!

Tags (2)
0 Karma

gfuente
Motivator

Hello

As you said, it will work with a join. But I think it will perform better using something like:

source="syslog.log" OR source="syslog-prehash.log" | stats dc(source) as DCS by hash

Previously you need to create an Alias of the original fields to "hash", so in both sources you have the same field name, and therefore the stats count by that common field works.

Then you will get the results, if you get a "2" value, then the hash matches for that particular hash, if you a "1" value then you only have the hash from one of the sources, so no match.

After that you could filter the ones that doesn´t match, using: search DCS=1

Regards

0 Karma

MuS
SplunkTrust
SplunkTrust

may I ask why not use a simple

source="syslog.log" OR source="syslog-prehash.log" | where sha256!=event_hash

this should work as well

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...