Splunk Search

Pass arguments from one search to another

atanasmitev
Path Finder

Hello guys,

I am trying to perform simple search, but with no success right now.
Here's my sample search, just changed the name of the columns for the sake of security:

1)index=myindex source="where_we_search.log" "URL Query" | stats count by IP_Address | search count >20
Now, 1) produces output of the type:

IP_Address Count
1.1.1.1 30
2.2.2.2 40

What I want to achieve is, for every IP in IP_Address column, search for count of Field2 (existing), like so, not working :
2)index=myindex source="where_we_search.log" "URL Query" | stats count by IP_Address | search count >20 | rename IP_Address as IPA | stats count(IPA) by "Field2"

IF I split the search in two, it passes, but I want to automate.

Help ?

Tags (2)
0 Karma

somesoni2
Revered Legend

Why not like this...

index=myindex source="where_we_search.log" "URL Query" field2=* | stats count by IP_Address, field2 | eventstats sum(count) as Total by IP_Address | search Total >20 
0 Karma

atanasmitev
Path Finder

Hello all,
After a couple of hours of searching, google provided the best idea.
Now here's the result:

index=myindex source="where_we_search.log" "URL Query" field2=* | stats count by IP_Address| search count > 20 | map maxsearches=5 search="index=myindex source="where_we_search.log" IP_Address=$IP_Address$ | stats count by field2 "

Thanks for your time. Now I need to figure how to output the results of the two searches into a table/csv.

Kind regards,

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...