Splunk Search

How do you count Unique IDs, in both indexes, based on a specific event?

diegofavoretto
New Member

I am trying to get Unique IDs (appears in both indexes) but I only want to count if there is event_name="AccountFinalized OR event_name="AccountActivated" in index 1 AND event_name="Deposit" in index 2.

(index=capi_event event_name="AccountFinalized" OR event_name="AccountActivated" account_id ) OR (index=piq_event ) | join type=inner  "account_id" [search index=piq_event event_name="DEPOSIT" account_id state!="WAITING_INPUT"] | stats dc(account_id) AS uniqueID dc(status) AS uniqueStatus count(state) AS State by event_name | 
Tags (2)
0 Karma

valiquet
Contributor

(index=capi_event event_name="AccountFinalized" OR event_name="AccountActivated" account_id ) AND ( index=piq_event event_name="DEPOSIT" account_id state!="WAITING_INPUT")
| stats values(account_id)

0 Karma

whrg
Motivator

Hello @diegofavoretto,

You can use a subsearch to filter for IDs in the second index:

index=capi_event event_name="AccountFinalized" OR event_name="AccountActivated" [search index=piq_event event_name="DEPOSIT" | table account_id]
| stats ...
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...