<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to join two sources with common one common field ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576996#M201091</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/190794"&gt;@johnhuang&lt;/a&gt;&amp;nbsp; - I tried with Stats(value) and sharing you the screenshot. Some of them are multivalue fields, I believe thats why the remaining fields are not populating . Stats(max) removes the multivalue with one value , but then again , rest of the fields are not populating, and also I would want each multivalue field to become separate rows.&amp;nbsp; Please find the attachment and suggest.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Dec 2021 08:33:39 GMT</pubDate>
    <dc:creator>zacksoft_wf</dc:creator>
    <dc:date>2021-12-02T08:33:39Z</dc:date>
    <item>
      <title>How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576869#M201039</link>
      <description>&lt;P&gt;I have sourcetype&lt;U&gt; A&lt;/U&gt; that has info about service_accounts such as&lt;U&gt; name, AU, email , full_name, manager_name&lt;/U&gt;.&lt;BR /&gt;But some of the events in source A, do not contain the field&amp;nbsp; email , manager_name, full_name field. In those cases I have to look into another index and sourcetype, say B to fetch those data. &lt;U&gt;AU&lt;/U&gt; is the common field name in both . Can we join the data, without having to use 'join' for performance issue ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 11:17:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576869#M201039</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-01T11:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576871#M201041</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;this is doable and even preferred way to join those without join. Here is couple of links how to do it and why those are better ways.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://conf.splunk.com/files/2020/slides/TRU1761C.pdf" target="_blank"&gt;https://conf.splunk.com/files/2020/slides/TRU1761C.pdf&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Here is another answer about replacing joins&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/What-is-the-relation-between-the-Splunk-inner-left-join-and-the/m-p/391288/thread-id/113948" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/What-is-the-relation-between-the-Splunk-inner-left-joi...&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;check woodcock’s answer with examples.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;r. Ismo&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 11:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576871#M201041</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2021-12-01T11:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576890#M201048</link>
      <description>&lt;P&gt;I am trying to make it work. Here is my SPL, and this one works and gives me the expected results. and I am having trouble converting it to a stats .&lt;BR /&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;`index=bayseian` account_type="Service Account" OR cred="False" OR type=W&lt;BR /&gt;| join type=left au&lt;BR /&gt;[ search index=alts sourcetype=auxilary&amp;nbsp;&lt;BR /&gt;| fields service_account_id,service_account_name,au,owner_elid,au_owner_name,au_owner_email ]&lt;BR /&gt;| eval pwd_expires=if(nopassexpire==1, "True", "False"), account_type=if(type=="S", "Service Account", account_type)&lt;BR /&gt;| eval elid=coalesce(elid,owner_elid)&lt;BR /&gt;| eval au_owner_email=coalesce(email_address,au_owner_email)&lt;BR /&gt;| eval au_owner_name=coalesce(full_name,au_owner_name)&lt;BR /&gt;| eval service_accout_name=coalesce(cn,service_account_name)&lt;BR /&gt;| eval service_account_id=coalesce(service_account_id,app_id)&lt;BR /&gt;| rename acct_name as user, account_type as type&lt;BR /&gt;| eventstats dc(sourcetype) as dc_st&lt;BR /&gt;| where dc_st&amp;gt;1&lt;BR /&gt;| eval user=lower(user)&lt;BR /&gt;| dedup user&lt;BR /&gt;| rex field=user "[^:]+:(?&amp;lt;user&amp;gt;[^\s]+)"&lt;BR /&gt;| table user type pwd_expires is_interactive service_account_id service_account_name au au_owner_name job_title au_owner_email owner_elid manager_name lob&lt;BR /&gt;| eval _key=user+".key"&lt;BR /&gt;==============================================================&lt;BR /&gt;&lt;BR /&gt;Any help please?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 13:00:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576890#M201048</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-01T13:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576897#M201052</link>
      <description>&lt;P&gt;Are you sure you want to use a join? what you need is something like this -&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=bayseian OR index =alt)|stats values (field1, field2) by AU&lt;/LI-CODE&gt;&lt;P&gt;Here is what I want you to do, limit your query first to 2 fields (field1 and field2 are just placeholders) and assuming AU is your common field , retrofit the above the search and run it. See the output of the above query, I am sure you will get what I am hinting at. If you manage to get all the field values&amp;nbsp; from the above query,the rest of the evals, regexes can be applied later, try it out and let us know&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 13:47:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576897#M201052</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-01T13:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576920#M201061</link>
      <description>&lt;P&gt;In my case , I have to search for fields in index bayseian, if the field/fields is not found (means no value), I have to check the other index, where that field might be there but with a different field name. And there is one common field between these two datasources&amp;nbsp; to correlate .&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 15:51:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576920#M201061</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-01T15:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576933#M201068</link>
      <description>&lt;P&gt;Assuming&amp;nbsp; b_name, b_email, b_manager_name, b_full_name are the fieldnames for index "B".&lt;/P&gt;&lt;P&gt;(index=A OR index=B)&lt;BR /&gt;| table AU, name, email, full_name, manager_name, b_name, b_email, b_manager_name, b_full_name&lt;BR /&gt;| stats MAX(*) AS * BY AU&lt;BR /&gt;| eval name=COALESCE(name, b_name)&lt;BR /&gt;| eval email=COALESCE(email, b_email)&lt;BR /&gt;| eval full_name=COALESCE(full_name, b_full_name)&lt;BR /&gt;| eval manager_name=COALESCE(manager_name, b_manager_name)&lt;BR /&gt;| table AU, name, email, full_name, manager_name&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 18:42:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576933#M201068</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2021-12-01T18:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576996#M201091</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/190794"&gt;@johnhuang&lt;/a&gt;&amp;nbsp; - I tried with Stats(value) and sharing you the screenshot. Some of them are multivalue fields, I believe thats why the remaining fields are not populating . Stats(max) removes the multivalue with one value , but then again , rest of the fields are not populating, and also I would want each multivalue field to become separate rows.&amp;nbsp; Please find the attachment and suggest.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 08:33:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/576996#M201091</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T08:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577004#M201094</link>
      <description>&lt;P&gt;the field 'elid' which is coming empty, is that an index field? Also can you check if elid field is missing for all rows or only for some rows&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 08:51:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577004#M201094</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-02T08:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577006#M201096</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/182782"&gt;@Sukisen1981&lt;/a&gt;&amp;nbsp; Not an indexed field. Just a regular field. And&amp;nbsp; as i check now elid and others are not empty for all rows.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 09:00:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577006#M201096</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T09:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577007#M201097</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237518"&gt;@zacksoft_wf&lt;/a&gt;&amp;nbsp; Sorry, I meant to ask the field elid, it is present in one of the indexes, right? All we have done in the query is make a table of the needed fields followed by a stats values(*). But the bigger question is , and I was suspecting the missing elid is not an issue with the stats. Is it possible for you to check(say for the first row in your screen shot where AU=0), if elid is indeed present in either indexes for AU=0?&lt;/P&gt;&lt;P&gt;PS- I think we are near to the actual solution &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; its just that we need to have a better understanding of the fields in your index&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 09:12:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577007#M201097</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-02T09:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577014#M201099</link>
      <description>&lt;P&gt;&amp;nbsp; I tried&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/190794"&gt;@johnhuang&lt;/a&gt;&amp;nbsp;'s solution with a change , it populates but not quite the way i wanted.&lt;BR /&gt;&lt;BR /&gt;=========&lt;/P&gt;&lt;P&gt;(`index=A) OR (index=B)&lt;BR /&gt;| eval pwd_expires=if(nopassexpire==1, "True", "False"), account_type=if(type=="S", "Service Account", account_type)&lt;BR /&gt;| table is_interactive,account_name,cn,au,acct_name,elid,full_name,full_name,email_address,manager_name,service_account_name,job_title,lob,pwd_expires,service_accout_name,account_type,service_account_id,service_account_id,owner_elid,au_owner_name,au_owner_email&lt;BR /&gt;|&lt;STRONG&gt; eventstats MAX&lt;/STRONG&gt;(*) AS * BY au&lt;BR /&gt;| eval elid=coalesce(elid,owner_elid)&lt;BR /&gt;| eval au_owner_email=coalesce(au_owner_email,email_address)&lt;BR /&gt;| eval au_owner_name=coalesce(au_owner_name,full_name)&lt;BR /&gt;| eval service_accout_name=coalesce(service_account_name,cn)&lt;BR /&gt;| eval service_account_id=coalesce(service_account_id,app_id)&lt;BR /&gt;| rename acct_name as user, account_type as type| eval user=lower(user)&lt;BR /&gt;&lt;BR /&gt;| table user type pwd_expires is_interactive service_account_id service_account_name au au_owner_name job_title au_owner_email elid manager_name lob&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;=========&lt;BR /&gt;&lt;BR /&gt;I changed stats to eventstats , it populates value, but i think because of the usage of MAX() function I am not seeing multiple service_account_id or service_acount_names asociated to each au. I am just seeing one entry. But in real the multivalue fields should be split into different rows , but now MAX() messes things up,&amp;nbsp; and stats values() is creating some multivalue fileds !!!!&amp;nbsp; &amp;nbsp; &amp;nbsp;stuck !!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 10:07:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577014#M201099</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T10:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577058#M201105</link>
      <description>&lt;P&gt;for every 'au', there are multiple service_account_name, service_account_id, user. hence a multivalue field creation while using eventstats using max() function is just giving me one value of&amp;nbsp;service_account_name, service_account_id, user per each 'au' . And that's incorrect. If I could see all the multivalue fields split , like multiple au rows for each combination of its associated service_account_name etc field,that would be helpful. 'cos in the end I intent to write this result into a kvstore lookup.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 13:41:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577058#M201105</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T13:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577070#M201107</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237518"&gt;@zacksoft_wf&lt;/a&gt;&amp;nbsp; eventstats wont give you the correct answer, eventstats over a field will return a function(like max or min) of all the events. Coming back to my question , were you able to see why some field values for eild was missing and some came in the stats values(*) query? If we can fix that our job is almost done, for then we just need to use the mvzip and(or) mvexpand functions to get the desired output.&lt;/P&gt;&lt;P&gt;Can you investigate a bit more on the empty/non empty values for eild?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:49:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577070#M201107</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-02T14:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577075#M201108</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/182782"&gt;@Sukisen1981&lt;/a&gt;&amp;nbsp; "elid" is present for some events and absent for some.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:57:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577075#M201108</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T14:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577077#M201109</link>
      <description>&lt;P&gt;I got that, what i am asking is can you see any pattern or condition under which elid is missing and elid is coming? I mean to say, is it possible to see the raw events which are causing empty elids and events which are returning elid multivalues? Maybe something to do with the way events are being logged in the indexes&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:00:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577077#M201109</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-02T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577083#M201111</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/182782"&gt;@Sukisen1981&lt;/a&gt;&amp;nbsp; Actually , elid is not a multivalue field. user, service_account_name, service_account_id are.&amp;nbsp; &amp;nbsp;&lt;BR /&gt;elid is present is some events (not all), and that is okay for us. There is no pattern .&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:06:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577083#M201111</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T15:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577084#M201112</link>
      <description>&lt;P&gt;if that's ok then going back to your original screen shot if we can get one row for each multivalue field, does that solve your requirement?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:08:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577084#M201112</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2021-12-02T15:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577088#M201114</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/182782"&gt;@Sukisen1981&lt;/a&gt;&amp;nbsp; yes&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:32:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577088#M201114</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2021-12-02T15:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577149#M201133</link>
      <description>&lt;P&gt;Instead of MAX, you can use VALUES to list out the multivalue fields.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VALUES(*) AS *&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 22:28:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577149#M201133</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2021-12-02T22:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to join two sources with common one common field ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577161#M201138</link>
      <description>&lt;P&gt;Yes that's easy to do. Instead of MAX, use VALUES(*) AS *.&lt;/P&gt;&lt;P&gt;Then run this command for each mutivalued field that you want to expand/flatten.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;| mvexpand &lt;EM&gt;field_name_1&lt;BR /&gt;&lt;/EM&gt;| mvexpand&lt;EM&gt; field_name_2&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 23:45:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-join-two-sources-with-common-one-common-field/m-p/577161#M201138</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2021-12-02T23:45:02Z</dc:date>
    </item>
  </channel>
</rss>

