Splunk Search

What is this query executing?

abhi04
Communicator

Please explain the below query and why the source i.e. source="dfw1lvpap415" is mentioned in the join ?

index="auto_preprod_sa3_host"  ":" AND ("architecture" OR  "cpu*" OR "CPU(s)" OR "model*" OR "Model*") | rex field=_raw "(?.*)\:\s(?.*\d+|\w+|[a-z0-9#.)-])"   
| rex field=source "/output/(?.*\w\d)\_" | join Parameter [search index="auto_preprod_sa3_host"  ":" AND ("architecture" OR  "cpu*" OR "CPU(s)" OR "model*" OR "Model*") source="*dfw1lvpap415*" 
|rex field=_raw "(?.*)\:\s(?.*\d+|\w+|[a-z0-9#.)])"]     | table  Parameter, abc,def,Server_Name    | eval  Message=if(match(abc,def), "Same","Not Same")      
| search Parameter=*  AND  NOT (Parameter="Model name" OR Parameter="model name " OR Parameter="model       "  OR  Parameter="cpu MHz       ")  | stats  values(abc) AS Realtime_Configurations values(def) AS Reference_Configurations values(Server_Name) AS Server by Parameter Message    
| where  Message="Not Same"
Tags (2)
0 Karma
1 Solution

skoelpin
SplunkTrust
SplunkTrust

This is searching an index and doing 2 extractions, the first one is on raw data and the second one is extracting from source. These have no field names

It's then joining on another search with the common field Parameter and doing another extraction. Its than creating a table with the Parameter field and I'm assuming the fields that were extracted out. It's then creating a new field called message with conditional logic. If it matches then it will give message a value of "same" else it gives it a value of "Not Same". It's then searching for all fields with a Parameter field but excluding the values "Model Name", "model name", "model", and "cpu MHz". Lastly, its listing all its values in a table form and only searching where Message="not same"

No idea for source="dfw1lvpap415". You should do a quick tstats to see if that lives in your data

View solution in original post

0 Karma

skoelpin
SplunkTrust
SplunkTrust

This is searching an index and doing 2 extractions, the first one is on raw data and the second one is extracting from source. These have no field names

It's then joining on another search with the common field Parameter and doing another extraction. Its than creating a table with the Parameter field and I'm assuming the fields that were extracted out. It's then creating a new field called message with conditional logic. If it matches then it will give message a value of "same" else it gives it a value of "Not Same". It's then searching for all fields with a Parameter field but excluding the values "Model Name", "model name", "model", and "cpu MHz". Lastly, its listing all its values in a table form and only searching where Message="not same"

No idea for source="dfw1lvpap415". You should do a quick tstats to see if that lives in your data

0 Karma

diogofgm
SplunkTrust
SplunkTrust

its easier to tell what are you looking to accomplish.

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

abhi04
Communicator

The above query is for CPU configuration comparison.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...