<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do you pull and match data? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388326#M172073</link>
    <description>&lt;P&gt;Hey,&lt;/P&gt;

&lt;P&gt;So the data I am pulling from is from two source types. I indexed bigfix and tried to pull the software information(vendor), and I pulled from bigfix asset to get the (device type). I'm trying to create a dashboard of the installed software by device type.&lt;/P&gt;

&lt;P&gt;When I enter this:  index=bigfix sourcetype=bigfix:software:inventory | table vendor| join [search index=* sourcetype=bigfix:asset|table computer_type ]| stats count by vendor,computer_type &lt;/P&gt;

&lt;P&gt;The computer type doesn't output correctly.&lt;/P&gt;

&lt;P&gt;When I enter...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=bigfix (sourcetype="bigfix:software:inventory" OR sourcetype="bigfix:asset") | stats count(product) by computer_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;...it shows the computer type correctly, but the vendor count is 0.&lt;/P&gt;

&lt;P&gt;Maybe because the events, and fields, don't match from both source types. If it's possible to make it work. I would appreciate the help. &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 23:55:50 GMT</pubDate>
    <dc:creator>laquantat</dc:creator>
    <dc:date>2020-09-29T23:55:50Z</dc:date>
    <item>
      <title>How do you pull and match data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388326#M172073</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;

&lt;P&gt;So the data I am pulling from is from two source types. I indexed bigfix and tried to pull the software information(vendor), and I pulled from bigfix asset to get the (device type). I'm trying to create a dashboard of the installed software by device type.&lt;/P&gt;

&lt;P&gt;When I enter this:  index=bigfix sourcetype=bigfix:software:inventory | table vendor| join [search index=* sourcetype=bigfix:asset|table computer_type ]| stats count by vendor,computer_type &lt;/P&gt;

&lt;P&gt;The computer type doesn't output correctly.&lt;/P&gt;

&lt;P&gt;When I enter...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=bigfix (sourcetype="bigfix:software:inventory" OR sourcetype="bigfix:asset") | stats count(product) by computer_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;...it shows the computer type correctly, but the vendor count is 0.&lt;/P&gt;

&lt;P&gt;Maybe because the events, and fields, don't match from both source types. If it's possible to make it work. I would appreciate the help. &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:55:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388326#M172073</guid>
      <dc:creator>laquantat</dc:creator>
      <dc:date>2020-09-29T23:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: How do you pull and match data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388327#M172074</link>
      <description>&lt;P&gt;Do these sourcetypes have fields that are common between them?&lt;/P&gt;

&lt;P&gt;Please share an example event from each&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 17:24:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388327#M172074</guid>
      <dc:creator>martinpu</dc:creator>
      <dc:date>2019-04-02T17:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: How do you pull and match data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388328#M172075</link>
      <description>&lt;P&gt;No they don't have any fields in common.&lt;/P&gt;

&lt;P&gt;Bigfix:software:inventory&lt;BR /&gt;
root_host="-----",comp_id="---",vendor="Google Inc.",product="Google Chrome",version="73.0",valid_from="2019-04-------",used_dt="None",updated_dt="2019-04-----",deleted="False",cpe="cpe:/a:google_inc.:google_chrome:73.0",last_scan_time="Fri, 29 Mar 00000"&lt;/P&gt;

&lt;P&gt;Bigfix:asset&lt;BR /&gt;
computer_type="", mac address"", identifying_number"---",computer_name="", ip_address"", disk drive""&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:55:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388328#M172075</guid>
      <dc:creator>laquantat</dc:creator>
      <dc:date>2020-09-29T23:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: How do you pull and match data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388329#M172076</link>
      <description>&lt;P&gt;If they have any fields that have common values, for e.g. &lt;BR /&gt;
comp_id has same value as  identifying_number you could join them based on that field.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=bigfix sourcetype=bigfix:software:inventory 
| table comp_id vendor 
| join comp_id
    [ search index=bigfix  sourcetype=bigfix:asset 
    | rename identifying_number as comp_id
    | table comp_id computer_type ] 
| stats count by comp_id vendor computer_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Basically, if you have a way of connecting a unique computer identifier to a specific event in software inventory then this would be possible to do.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:55:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388329#M172076</guid>
      <dc:creator>martinpu</dc:creator>
      <dc:date>2020-09-29T23:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: How do you pull and match data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388330#M172077</link>
      <description>&lt;P&gt;Moving comment to answer...&lt;/P&gt;

&lt;P&gt;If they have any fields that have common values, for e.g. &lt;BR /&gt;
comp_id has same value as identifying_number you could join them based on that field.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=bigfix sourcetype=bigfix:software:inventory 
 | table comp_id vendor 
 | join comp_id
     [ search index=bigfix  sourcetype=bigfix:asset 
     | rename identifying_number as comp_id
     | table comp_id computer_type ] 
 | stats count by comp_id vendor computer_type
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In essence, if you have a way of connecting a unique computer identifier to a specific event in software inventory then this would be possible to do.&lt;/P&gt;

&lt;P&gt;Additionally if you do not have an exact 1-1 identifier but have a snippet of an identifier in a field e.g&lt;BR /&gt;
computer_id=LNWMP-0012341&lt;BR /&gt;
identifying_nubmer=0012341 &lt;BR /&gt;
You could extract the number from the ID with the rex command.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:56:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-pull-and-match-data/m-p/388330#M172077</guid>
      <dc:creator>martinpu</dc:creator>
      <dc:date>2020-09-29T23:56:33Z</dc:date>
    </item>
  </channel>
</rss>

