Splunk Search

Splunk search for field values in multiple sources

infotork
Explorer

There are two sourcetypes ,

sourcetype=A  sourcetype=B  and we have extracted a field "login" in both sourcetypes

1. we need to have a "count"  of the login values which are available in sourcetype=A but not in sourcetype=B

2. we need to have a "list of values"  of the login values which are available in sourcetype=A but not in sourcetype=B

3. Any Graph that we can show the these many "login" are missing in compare with sourcetypes using timechart? - any suggestions?

Labels (3)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
sourcetype="A" OR sourcetype="B"
| eval sourcetypeA=if(sourcetype="A",sourcetype,null)
| eval sourcetypeB=if(sourcetype="B",sourcetype,null)
| stats values(sourcetypeA) as sourcetypeA values(sourcetypeB) as sourcetypeB by login
| where sourcetypeA="A" and isnull(sourcetypeB)
| stats count
0 Karma
Get Updates on the Splunk Community!

Leveraging Detections from the Splunk Threat Research Team & Cisco Talos

  Now On Demand  Stay ahead of today’s evolving threats with the combined power of the Splunk Threat Research ...

New in Splunk Observability Cloud: Automated Archiving for Unused Metrics

Automated Archival is a new capability within Metrics Management; which is a robust usage & cost optimization ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...