Splunk Search

Subsearch not Working

Makinde
New Member

I believe I fully understand the concept of subsearches and have used it a few times perfectly, however, I can't get it to work in this instance.

Below is my search string;

index=main sourcetype="linux:audit" [ search index=main sourcetype="linux:audit" key=CFG_Oracle | return msg ] 

The idea here is to search index=main and sourcetype=linux:audit, for any event with key=CFG_oracle, then for those events return the values of the msg field after which the msg values should be searched in index=main and sourcetype=linux:audit and return those events.

However when I run this search, I get all events with keys other than CFG_Oracle, however when I tun the sub-search on it's own I get the desired result, I am not sure why this isn't working properly as a sub-search.

Any ideas?

0 Karma
1 Solution

somesoni2
Revered Legend

Try like this

index=main sourcetype="linux:audit" [ search index=main sourcetype="linux:audit" key=CFG_Oracle | stats count by msg | table msg]

View solution in original post

0 Karma

somesoni2
Revered Legend

Try like this

index=main sourcetype="linux:audit" [ search index=main sourcetype="linux:audit" key=CFG_Oracle | stats count by msg | table msg]
0 Karma

Makinde
New Member

Thanks Somesoni2

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...