Splunk Search

Search query with the field of a search like the one on another search

pinzer
Path Finder

Hi all, i need to take the events from this search

sourcetype="wmi:wineventlog:security"

that have the field Source_Network_Address into the field DestinationIP of the search eventtype="searchIPS2" Direction="Inbound" Severity="Medium"

how can i do this? thanks to all who can help me

Tags (1)
0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

use subsearch:

eventtype=searchIPS2 Direction=Inbound Severity=Medium [ search sourcetype=wmi:wineventlog:security Source_Network_Address=* | fields Source_Network_Address | rename Source_Network_Address as DestinationIP ]

View solution in original post

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

use subsearch:

eventtype=searchIPS2 Direction=Inbound Severity=Medium [ search sourcetype=wmi:wineventlog:security Source_Network_Address=* | fields Source_Network_Address | rename Source_Network_Address as DestinationIP ]
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...