Splunk Search

Porting ArcSight content to Splunk - compare between two fields of the same event

dragoslungu
Explorer

Hi,

I need to port ArcSight content to Splunk and I'm afraid I stumbled upon a fundamental difference on how to implement filters in ArcSight vs. saved searches in Splunk.

How to filter out events by comparing two event fields against each other ?

For instance, this is a simple search on Windows events and I want to list all the events where the "host" field is different from "dest" field

by searching for host!=dest, I get all events, even those where host=dest.

If I'm comparing each of the fields to constants or strings, it works; the problem is how to compare between two event fields.

I hope I made sense and I'd appreciate any hint.

Thank you.

0 Karma

dragoslungu
Explorer

SOLVED

you need to use "where" operator:

index=* | where host!=dest

Thanks !

0 Karma
Get Updates on the Splunk Community!

Introducing Ingest Actions: Filter, Mask, Route, Repeat

WATCH NOW Ingest Actions (IA) is the best new way to easily filter, mask and route your data in Splunk® ...

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...