I am a new to using Splunk and wanted to get some help in combining two search results and organizing it so that it displays matching information from the two searches.
So what I am doing a search for is something like the following. (I had to edit some of the info for security)
index=INDEX sourcetype=SOURCETYPE authresult (UNIQUEID)
This will provide me with several events with the necessary fields for what I am searching, but I need to compare the field UNIQUEHASH
from this search with the same field of another similar search with a different UNIQUEID
. I only want to get the information from UNIQUEHASH
if both searches include the same value and how many times they are returned.
So if I do a search for UNIQUEID1
and get the following number of events with the following UNIQUEHASH
values.
UNIQUEHASH Times
123 10
456 20
789 30
I would like to do the same search for UNIQUEID2
which provides the following UNIQUEHASH
values.
UNIQUEHASH Times
123 20
789 400
With these two searches I would like to combine them in a simple table with the UNIQUEHASH
and how many times each UNIQUEID
returned that amount. So in this example the UNIQUEHASH
w/ a value of 456 isn't included because UNIQUEID2
doesn't return any.
UNIQUEHASH UNIQUEID1 UNIQUEID2
123 10 20
789 30 400