Splunk Search

subsearch help

mcbradford
Contributor

Not sure how to accomplish this....

First search:

index="airtight" message=quarantined eventtype="airtight_intrusion" NOT Agere | stats count by client_mac

If results are returned from first search, take the results "client_mac" and perform this search

sourcetype="nac" client_mac

display results

does this look correct?

sourcetype="nac" [search index="airtight" message=quarantined eventtype="airtight_intrusion" NOT Agere | return 100 client_mac] | stats count by client_mac, Users_Name, Company, _time

Tags (2)
0 Karma

dart
Splunk Employee
Splunk Employee

I'd do
sourcetype="nac" [search index="airtight" message=quarantined eventtype="airtight_intrusion" NOT Agere | dedup client_mac| fields client_mac]

if you want to search for sourcetype=nac client_mac=XXX OR client_mac=YYY
or

sourcetype="nac" [search index="airtight" message=quarantined eventtype="airtight_intrusion" NOT Agere | dedup client_mac| format "" "" "" "" "OR" ""]

if you want to search sourcetype="nac" XXX OR YYY

Get Updates on the Splunk Community!

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...