Splunk Search

Porting ArcSight content to Splunk - compare between two fields of the same event

dragoslungu
Explorer

Hi,

I need to port ArcSight content to Splunk and I'm afraid I stumbled upon a fundamental difference on how to implement filters in ArcSight vs. saved searches in Splunk.

How to filter out events by comparing two event fields against each other ?

For instance, this is a simple search on Windows events and I want to list all the events where the "host" field is different from "dest" field

by searching for host!=dest, I get all events, even those where host=dest.

If I'm comparing each of the fields to constants or strings, it works; the problem is how to compare between two event fields.

I hope I made sense and I'd appreciate any hint.

Thank you.

0 Karma

dragoslungu
Explorer

SOLVED

you need to use "where" operator:

index=* | where host!=dest

Thanks !

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...