Splunk Search

return search with common fields

simonattardGO
Path Finder

I need to run two sub searches. Each of these sub-searches will return a set of fields, one of them is called transactionNumber.
Then I want to the search to return only those results from the two sub-searches which have an equal transactionNumber.

How can I do this?

Tags (3)
0 Karma
1 Solution

Ayn
Legend

Use set (http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Set):

| set intersect [search search1 | fields transactionNumber | fields - _*] [search search2 | fields transactionNumber | fields - _*]

If you want not just the transactionNumbers but also the actual events, you could feed this into a subsearch:

(search1) OR (search2) [| set intersect [search search1 | fields transactionNumber | fields - _*] [search search2 | fields transactionNumber | fields - _*] | fields transactionNumber ]

View solution in original post

Ayn
Legend

Use set (http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Set):

| set intersect [search search1 | fields transactionNumber | fields - _*] [search search2 | fields transactionNumber | fields - _*]

If you want not just the transactionNumbers but also the actual events, you could feed this into a subsearch:

(search1) OR (search2) [| set intersect [search search1 | fields transactionNumber | fields - _*] [search search2 | fields transactionNumber | fields - _*] | fields transactionNumber ]
Get Updates on the Splunk Community!

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...