Splunk Search

How to compare two searches using a shared variable?

ckutach
Engager

I am trying to make 2 searches using the same index and source.

The first search is looking for all entries with "message received" and the "Message Id". The second search is looking for the "Message Id" and "Message Type".  I am trying to find the number of messages received for a specific message type.

Example:

(index = exampleindex source = examplesource ("message received" AND "MessageId")  
| rex field=_raw "MessageId:(?<messageId1>[\S]+)\s.*" 
| eval Id1 = messageId1)
OR (index = exampleindex source = examplesource ("MessageType" AND "MessageId") 
| rex field=_raw "MessageId:(?<messageId2>[\S]+)\s.*" 
| eval Id2 = messageId2)

 I want to compare the 2 searches and count how many Ids in the 1st search appear in the 2nd search

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The OR operator works within certain commands, but cannot be used to combine commands.

Use OR within the base search to fetch events with the desired data then group them by the shared field.

(index = exampleindex source = examplesource (("message received" AND "MessageId") OR ("MessageType" AND "MessageId"))
| rex field=_raw "MessageId:(?<messageId>[\S]+)" 
``` Combine events based on shared messageId values ```
| stats values(*) as * by messageId
``` Discard events without a MessageType ```
| where isnotnull(MessageType)
| stats count by MessageType

 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The OR operator works within certain commands, but cannot be used to combine commands.

Use OR within the base search to fetch events with the desired data then group them by the shared field.

(index = exampleindex source = examplesource (("message received" AND "MessageId") OR ("MessageType" AND "MessageId"))
| rex field=_raw "MessageId:(?<messageId>[\S]+)" 
``` Combine events based on shared messageId values ```
| stats values(*) as * by messageId
``` Discard events without a MessageType ```
| where isnotnull(MessageType)
| stats count by MessageType

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...