Splunk Search

Can I use a where statement to show subsearches that meet two sets of criteria?

scc00
Contributor

I am trying to only show values within a report if both subsearches have a result. I am trying to show reporting on usage of privileged users, mapped to when they log into a network. Below is the current state of the search, I was trying to incorporate a final where statement like: "where status= " System Account Used", AND status="VDI Session Created" to make sure I don't get just one half of the results if the other does not exist. This doesn't work though. Thoughts on a better method?

|multisearch [search index=* *logged*  ComputerName=pci-vdi* user=****|fields + user,name, ComputerName,Msg,app, EventCode,src_ip] [search host=servername123 sourcetype=systemX user=system action=failure| fields + user,host, app, action]  |eval computer= coalesce(ComputerName, host), event=coalesce(name, action), Hour=strftime(_time, "%B %d %Y, %H:%M:%S %p"), user=upper(user) |where computer!=" " |eval status = case(app=="systemX"," System Account Used", app=="systemY","VDI Session Created") |  dedup Hour  | table Hour, user, computer, app,event, status |  sort Hour user
0 Karma

cmerriman
Super Champion

would |set union [search index=* *logged* ComputerName=pci-vdi* user=****|eval status = case(app=="systemX"," System Account Used", app=="systemY","VDI Session Created")|eval Hour=strftime(_time, "%B %d %Y, %H:%M:%S %p")|fields Hour, user,name, ComputerName,app,status] [search host=servername123 sourcetype=systemX user=system action=failure|rename host as ComputerName |rename action as name|eval status = case(app=="systemX"," System Account Used", app=="systemY","VDI Session Created")|eval Hour=strftime(_time, "%B %d %Y, %H:%M:%S %p")| fields Hour, user,name, ComputerName, app,status]
work? you don't have _time in there to do anything with hour, but i've added it.
https://docs.splunk.com/Documentation/SplunkCloud/6.6.1/SearchReference/Set

0 Karma

scc00
Contributor

Thanks cmerriman, unfortunately that doesn't work for me. My original search works to give me the results I need when both values comes back. Now I need to make sure the report does not populate if one of the two searches comes back with zero findings. So I'd like to only populate the search only if both subsearches have a value. For example

Hour User computer app event status
August 21, 2017 carol123 system123 window server "user logged in" "VDI Session Created"
August 21, 2017 priv123 systemx app server "user logged in" System Account Used"

vs

Hour User computer app event status
August 21, 2017 carol123 system123 window server "user logged in" "VDI Session Created"

I would like to not show the second event only the first options.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...