Splunk Search

Search if field value appears in another search or not

smcdonald20
Path Finder

Trying to find any DeviceId field values that appear in the ActiveSync search but NOT in the MobileIron search.
What is the best way to do this?

ActiveSync search:
index=msexchange source=otl_activesyncinventory

|dedup SamAccountName, DeviceId

|table companyOu, SamAccountName, "AD Account Enabled", DeviceId

MobileIron search:
index=msexchange source=otl_mobileiron
| table, DeviceId, MailboxId, Status

Tags (2)
0 Karma
1 Solution

rjthibod
Champion

This will give you the list of DeviceId values that only appear in the ActiveSync search.

index=msexchange (source=otl_activesyncinventory OR source=otl_mobileiron)
| stats count by source DeviceId
| eventstats dc(source) as dc by DeviceId
| search dc=1 source=otl_activesyncinventory
| fields DeviceId

You can then use that search in the first step of you first search to get the full table of results you are looking for

index=msexchange source=otl_activesyncinventory 
[   
    search index=msexchange (source=otl_activesyncinventory OR source=otl_mobileiron)
    | stats count by source DeviceId
    | eventstats dc(source) as dc by DeviceId
    | search dc=1 source=otl_activesyncinventory
    | fields DeviceId
]
|dedup SamAccountName, DeviceId 
|table companyOu, SamAccountName, "AD Account Enabled", DeviceId

View solution in original post

0 Karma

rjthibod
Champion

This will give you the list of DeviceId values that only appear in the ActiveSync search.

index=msexchange (source=otl_activesyncinventory OR source=otl_mobileiron)
| stats count by source DeviceId
| eventstats dc(source) as dc by DeviceId
| search dc=1 source=otl_activesyncinventory
| fields DeviceId

You can then use that search in the first step of you first search to get the full table of results you are looking for

index=msexchange source=otl_activesyncinventory 
[   
    search index=msexchange (source=otl_activesyncinventory OR source=otl_mobileiron)
    | stats count by source DeviceId
    | eventstats dc(source) as dc by DeviceId
    | search dc=1 source=otl_activesyncinventory
    | fields DeviceId
]
|dedup SamAccountName, DeviceId 
|table companyOu, SamAccountName, "AD Account Enabled", DeviceId
0 Karma
Get Updates on the Splunk Community!

Announcing the 1st Round Champion’s Tribute Winners of the Great Resilience Quest

We are happy to announce the 20 lucky questers who are selected to be the first round of Champion's Tribute ...

We’ve Got Education Validation!

Are you feeling it? All the career-boosting benefits of up-skilling with Splunk? It’s not just a feeling, it's ...

What’s New in Splunk Cloud Platform 9.1.2308?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2308! Analysts can ...