Splunk Search

How to compare different fields having the same value in different events?

pratibha2018
Explorer

How to compare different fields having the same value and though in different events?
For example : index1, source1, sourcetype1 has "n" events and index2, source2, sourcetype2 has "m" events .
Now, some fields from sourcetype1(say field1) have the same values as that of some fields of sourcetype2(sayfield2).
I want for field1=field2 list all the other fields of sourcetype2,sourcetype1. The thing is that I have to compare it in different events.
Not a single event is having both field1 and field2.

0 Karma
1 Solution

tiagofbmm
Influencer

Hi

Try this and let me know please

index2 source2 sourcetype2
 [ search index1 source1 sourcetype1 | dedup field1 | return 1000 field2=field1 ]
|  fields - field2

View solution in original post

0 Karma

tiagofbmm
Influencer

Hi

Try this and let me know please

index2 source2 sourcetype2
 [ search index1 source1 sourcetype1 | dedup field1 | return 1000 field2=field1 ]
|  fields - field2
0 Karma

pratibha2018
Explorer

It worked.

Many thanks!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...