A subsearch seems like the right answer here. A subsearch is enclosed in [] brackets inside your main search, runs first, and the results of that subsearch get fed back into the main search as sear...
See more...
A subsearch seems like the right answer here. A subsearch is enclosed in [] brackets inside your main search, runs first, and the results of that subsearch get fed back into the main search as search terms. So you have two searches here, the search that finds the cyberark data, and the one that finds the AD data. You didn't provide either of those separate searches, so I'm just making up some pseudosearches for those. Let's say your cyberark search is something like index=cyberark action=doAnImportantThing | dedup user Which would return a short list of users involved in ... well, whatever doAnImportantThing is in this case. Let's say 'Mary" and "John" So, at its simplest, you just use that as your subsearch. index=ad [search index=cyberark action=doAnImportantThing | dedup user] Don't forget to add "search" to the subsearch, it's automatic in the main search, but not anywhere else. So your subsearch runs, returns its data formatted like (( user=Mary ) OR (user=John) ), which means your outer search ends up being index=ad ( ( user=Mary ) OR (user=John) ) And there you go. You'll want to refer to here for more and more examples: https://docs.splunk.com/Documentation/Splunk/9.1.3/Search/Aboutsubsearches Some other comnmands/stuff to know - 'earliest=...' and 'latest=...', and also check out the 'format' command which can alter how the subsearch get returned (to do things like AND, or whatever else if you want).