
- #Splunk join to database how to#
- #Splunk join to database full#
Now let's have a look at the outer subsearch.
Line 10, of course, closes the innermost subsearch. Line 9 passes the results back to he enclosing search in a way so it can be used as part of the search string. They would be problematic with the following format command. Line 8 gets rid of all the fields we don't require. Line 7 is a different way to deduplicate by bcSender and at the same time reduce the amount of data which needs to be sent back from indexers to the searchhead (if you have a distributed environment). We need the fieldname to be bcSender for the outer search. (We could extract it to the field from first and then rename it, but this is more direct.) Line 6 extracts the addresses directly into the field bcSender. Line 5 selects the events in from which you generate the address list. Let's start from the innermost subsearch. I can not really verify it without having your data, but I'll try to explain what it's supposed to do. Index=mail sourcetype=sendmail_syslog rex field=from ".*)>" Try something along these lines: index=mail sourcetype=barracuda bcSendAction=1 This sounds like you need a subsearch (for getting the sender addresses) inside of another subsearch (for getting the messageID's), meaning your own attempt was pointing in the right direction already. use these messageID's to finally get the events you are looking for. use these sender addresses to get a list of messageID's from index=mail sourcetype=barracuda. get the sender addresses from index=mail sourcetype=sendmail_syslog.
If I understand your request properly, then you need 3 steps:
#Splunk join to database how to#
I don't know that I am referencing the email from the first result set correctly.Ĭan someone point me in the right direction with how to approach this search? My attempt at this was something like: index=mail sourcetype=sendmail_syslog rex field=from ".*)>" I followed a few emails and tutorials, but a lot of the joins I was seeing only used two different sources/datasets and didn't use the search as I did in my first query. I was able to parse the log and pull out just the email addresses that I want to use to plug into my first search. I would like to use the result of this (the email value) in the first search so that I don't have to hard-code the bcSender, but rather have it use the results from the other source.
Now, my other search is a log that shows all of the sender email addresses during a certain time period. Index=mail sourcetype=barracuda bcSendAction=1 This allows me to search through the mail logs by sender address and show all emails with a bcSendAction=1, which is a successful send. I am trying to join this data together so I can create some type of chart, but I am unsure of this would be a join/search etc. I have two data sources and was given a query to pull data from them individually.
#Splunk join to database full#
Full disclosure, I am very new Splunk so I may explain my question incorrectly.