Splunk Search

Match the value in same fieldname on different log

marendra
Explorer

Hi All,

I need to match two value from different logs but same field name. How can I do that?
Example I have Ironport where it has recipient field and exchange server behind it that has recipient field as well. I want make condition before I do the search where the recipient in ironport must be the same recipient in th exchange.
In database example it is quite easy where we can do table1.sender==table2.sender (tabel1 abd table2 is for ironport and exchange respectively)
How can i do it in splunk?

Please advise

Thank you

Tags (1)
0 Karma

dwaddle
SplunkTrust
SplunkTrust

Splunk has a join operation as well, but it is usually not the best performing approach. http://www.innovato.com/splunk/SQLSplunk.html

For this example, you might find using Splunk transactions to be of use. http://www.splunk.com/base/Documentation/latest/Knowledge/Abouttransactions

marendra
Explorer

Hi

Thanks a lot. Unfortunately, it couldn't work for my case.
Anyway, it is a good link you gave me there.

Thanks again

Regards

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...