Splunk Search

multiple searches combine into one report

ajromero
Path Finder

I have 3 reports that I want to put into one report, here is my search

sourcetype=MSExchange:*:MessageTracking source_id=SMTP (event_id=RECEIVE) user_bunit=Energy recipient_domain="IID.com"
| stats count as RECEIVE by recipient
|append
[search sourcetype=MSExchange:*:MessageTracking source_id=SMTP (event_id=SEND) user_bunit=Energy recipient_domain="IID.com" | stats count as SEND by recipient]
|table recipient, SEND, RECEIVE

The data I get is only the recipient and RECEIVE data, it does not display the SEND information

what  I missing here

 

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

It seems like the answer should be clear, but I'm drawing a blank ATM.  Try this variant, instead.  BTW, you said 3 searches, but the query only does 2.

sourcetype=MSExchange:*:MessageTracking source_id=SMTP (event_id=RECEIVE OR event_id=SEND) user_bunit=Energy recipient_domain="IID.com"
| stats sum(eval(event_id=RECEIVE)) as RECEIVE, sum(eval(event_id=SEND)) by recipient
|table recipient, SEND, RECEIVE

This should run faster since it only makes one pass through the index (which you should specify). 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

It seems like the answer should be clear, but I'm drawing a blank ATM.  Try this variant, instead.  BTW, you said 3 searches, but the query only does 2.

sourcetype=MSExchange:*:MessageTracking source_id=SMTP (event_id=RECEIVE OR event_id=SEND) user_bunit=Energy recipient_domain="IID.com"
| stats sum(eval(event_id=RECEIVE)) as RECEIVE, sum(eval(event_id=SEND)) by recipient
|table recipient, SEND, RECEIVE

This should run faster since it only makes one pass through the index (which you should specify). 

---
If this reply helps you, Karma would be appreciated.

alonsocaio
Contributor

Hi,

Could you please provide a sample of your logs?


Based on the fields described in your search I created a sample file and could reach the results using the following query:

index=... source_id=SMTP (event_id=RECEIVE) user_bunit=Energy recipient_domain="IID.com" 
| stats count as RECEIVE by recipient 
| append
    [ search index=... source_id=SMTP (event_id=SEND) user_bunit=Energy recipient_domain="IID.com" 
    | stats count as SEND by recipient] 
| stats values(SEND) as SEND, values(RECEIVE) as RECEIVE by recipient

The was my output:

alonsocaio_0-1592871009955.png

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...