Splunk Search

combine two searches

msalghamdi
Path Finder

Dear Splunker

i need a search that gets me if  theres a host that has these logs, below is a psudeo search that show what i really want:

index=linux host=* sourcetype=bash_history AND ("systemctl start" OR "systemctl enable") | union [search index=linux host=* sourcetype=bash_history (mv AND /opt/ ) ]

just to make more clearer, i want a match only  if a server generated a log that contains "mv AND /opt/" and another log that contains "systemctl start" OR "systemctl enable"

 

 

 

thanks in advance

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=linux host=* sourcetype=bash_history "systemctl start" OR "systemctl enable" OR (mv /opt/)
| eval systemctl=if(searchmatch("systemctl"), "systemctl",null())
| eval mo_opt=if(searchmatch("mv") AND searchmatch("/opt/"), "mv_opt", null())
| stats dc(mv_opt) as mv_opt dc(systemctl) as systemctl by host
| where mv_opt==1 and systemctl==1

View solution in original post

msalghamdi
Path Finder

it worked, thanks Whisperer, a helping hand as alwas

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=linux host=* sourcetype=bash_history "systemctl start" OR "systemctl enable" OR (mv /opt/)
| eval systemctl=if(searchmatch("systemctl"), "systemctl",null())
| eval mo_opt=if(searchmatch("mv") AND searchmatch("/opt/"), "mv_opt", null())
| stats dc(mv_opt) as mv_opt dc(systemctl) as systemctl by host
| where mv_opt==1 and systemctl==1
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...