Splunk Search

Pass arguments from one search to another

atanasmitev
Path Finder

Hello guys,

I am trying to perform simple search, but with no success right now.
Here's my sample search, just changed the name of the columns for the sake of security:

1)index=myindex source="where_we_search.log" "URL Query" | stats count by IP_Address | search count >20
Now, 1) produces output of the type:

IP_Address Count
1.1.1.1 30
2.2.2.2 40

What I want to achieve is, for every IP in IP_Address column, search for count of Field2 (existing), like so, not working :
2)index=myindex source="where_we_search.log" "URL Query" | stats count by IP_Address | search count >20 | rename IP_Address as IPA | stats count(IPA) by "Field2"

IF I split the search in two, it passes, but I want to automate.

Help ?

Tags (2)
0 Karma

somesoni2
Revered Legend

Why not like this...

index=myindex source="where_we_search.log" "URL Query" field2=* | stats count by IP_Address, field2 | eventstats sum(count) as Total by IP_Address | search Total >20 
0 Karma

atanasmitev
Path Finder

Hello all,
After a couple of hours of searching, google provided the best idea.
Now here's the result:

index=myindex source="where_we_search.log" "URL Query" field2=* | stats count by IP_Address| search count > 20 | map maxsearches=5 search="index=myindex source="where_we_search.log" IP_Address=$IP_Address$ | stats count by field2 "

Thanks for your time. Now I need to figure how to output the results of the two searches into a table/csv.

Kind regards,

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...