Splunk Search

subsearch by ip and then host

mcbradford
Contributor

I am building a dashboard based on all activity related to an IP. I have one source that generates events, but does not always include the IP. The events that do have an IP always have the host name. From one search, I want to search by IP, but also associate the IP to a host name and then search again with the host name and display all events.

Tags (1)
0 Karma

gpullis
Communicator

You're looking for something like this?

source="mySourceType" [search source="mySourceType" myIPAddressField=192.168.53.105 | fields host]
0 Karma

mcbradford
Contributor

that worked - thanks!

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...