You can't use lookup on an index, only a lookup table. I think this should work and won't have the limitations of the subsearch ((`cim_Authentication_indexes`) tag=authentication NOT (action=succes...
See more...
You can't use lookup on an index, only a lookup table. I think this should work and won't have the limitations of the subsearch ((`cim_Authentication_indexes`) tag=authentication NOT (action=success user=*$))
OR (index="tml_it-mandiant_ti" type=ipv4)
| eval origin=if(index="tml_it-mandiant_ti", "mandiant", "auth")
| eval IP_Addr = coalesce(value, dest, dst, Ip, source_ip, src_ip, src)
| stats dc(origin) as origins by IP_Addr
| where origins=2 so, it sets a new field 'origin' to be where the IP address is coming from and if the event is from the tml_it-mandiant_ti index., IP_Addr will be the value, otherwise it will be the other IP address from your original coalesce. Then just stats and count the number of origins you find. You need it to be 2, indicating the IP address is in both indexes.