Splunk Search

Match the value in same fieldname on different log

marendra
Explorer

Hi All,

I need to match two value from different logs but same field name. How can I do that?
Example I have Ironport where it has recipient field and exchange server behind it that has recipient field as well. I want make condition before I do the search where the recipient in ironport must be the same recipient in th exchange.
In database example it is quite easy where we can do table1.sender==table2.sender (tabel1 abd table2 is for ironport and exchange respectively)
How can i do it in splunk?

Please advise

Thank you

Tags (1)
0 Karma

dwaddle
SplunkTrust
SplunkTrust

Splunk has a join operation as well, but it is usually not the best performing approach. http://www.innovato.com/splunk/SQLSplunk.html

For this example, you might find using Splunk transactions to be of use. http://www.splunk.com/base/Documentation/latest/Knowledge/Abouttransactions

marendra
Explorer

Hi

Thanks a lot. Unfortunately, it couldn't work for my case.
Anyway, it is a good link you gave me there.

Thanks again

Regards

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...