<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to separate sets of information with same field values without using JOIN? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685115#M233792</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have field called filename .SO i want to populate the result from the filename field and i created two joins to separate. Is there any other way without using Join&lt;BR /&gt;&lt;BR /&gt;Success File and Failure File&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| join CorrelationId type=left
[ | search index=mulesoft applicationName IN (TEST) AND message IN ("*File put Succesfully*" ,"*successful Call*" , "*file processed successfully*" , "*Archive file processed successfully*" , "*processed successfully for file name*")
| rename content.Filename as SuccessFileName correlationId as CorrelationId
| table CorrelationId SuccessFileName
| stats values(*) as * by CorrelationId]
| table CorrelationId InterfaceName ApplicationName FileList SuccessFileName Timestamp
| join CorrelationId type=left
[ | search index=mulesoft applicationName IN (p-oracle-fin-processor , p-oracle-fin-processor-2 , p-wd-finance-api) AND priority IN (ERROR,WARN)
| rename content.Filename as FailureFileName correlationId as CorrelationId timestamp as ErrorTimestamp content.ErrorType as ErrorType content.ErrorMsg as ErrorMsg
| table FailureFileName CorrelationId ErrorType ErrorMsg ErrorTimestamp&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Apr 2024 11:56:47 GMT</pubDate>
    <dc:creator>karthi2809</dc:creator>
    <dc:date>2024-04-23T11:56:47Z</dc:date>
    <item>
      <title>How to separate sets of information with same field values without using JOIN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685115#M233792</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have field called filename .SO i want to populate the result from the filename field and i created two joins to separate. Is there any other way without using Join&lt;BR /&gt;&lt;BR /&gt;Success File and Failure File&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| join CorrelationId type=left
[ | search index=mulesoft applicationName IN (TEST) AND message IN ("*File put Succesfully*" ,"*successful Call*" , "*file processed successfully*" , "*Archive file processed successfully*" , "*processed successfully for file name*")
| rename content.Filename as SuccessFileName correlationId as CorrelationId
| table CorrelationId SuccessFileName
| stats values(*) as * by CorrelationId]
| table CorrelationId InterfaceName ApplicationName FileList SuccessFileName Timestamp
| join CorrelationId type=left
[ | search index=mulesoft applicationName IN (p-oracle-fin-processor , p-oracle-fin-processor-2 , p-wd-finance-api) AND priority IN (ERROR,WARN)
| rename content.Filename as FailureFileName correlationId as CorrelationId timestamp as ErrorTimestamp content.ErrorType as ErrorType content.ErrorMsg as ErrorMsg
| table FailureFileName CorrelationId ErrorType ErrorMsg ErrorTimestamp&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 11:56:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685115#M233792</guid>
      <dc:creator>karthi2809</dc:creator>
      <dc:date>2024-04-23T11:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate sets of information with same field values without using JOIN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685116#M233793</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/205249"&gt;@karthi2809&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;to help you I need also the main search.&lt;/P&gt;&lt;P&gt;Anyway, you should:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;create a main search putting in OR the three searches,&lt;/LI&gt;&lt;LI&gt;correlate them using the stats command By the common key and adding values(field_name) As field_name for each field that you want to display.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 12:01:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685116#M233793</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-04-23T12:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate sets of information with same field values without using JOIN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685121#M233796</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Yes for that i used stats values of filed name .But i cant able to seperate the error and succes file&lt;BR /&gt;&lt;BR /&gt;This is my new query :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=mulesoft environment=* (applicationName IN ("Test"))  
| stats  values(content.FileList{})  as FileList values(content.FileName)  as Filename values(content.Filename) as filename1 min(timestamp) AS Logon_Time, max(timestamp) AS Logoff_Time BY correlationId applicationName   
| eval  Status=case(priority="ERROR","ERROR", priority="WARN","WARN", priority!="ERROR","SUCCESS")
| eval SuccessFileName=mvdedup(mvfilter(match(message, "%succesfully*")  OR match(message, "Summary of all Batch*") ) )|eval SuccessFileName= coalesce(Filename,filename1)
| eval FailureFileName=mvdedup(mvfilter(match(priority, "WARN")  OR match(priority, "ERROR") ) )|eval FailureFileName= coalesce(Filename,filename1)|table SuccessFileName FailureFileName&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 12:22:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685121#M233796</guid>
      <dc:creator>karthi2809</dc:creator>
      <dc:date>2024-04-23T12:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate sets of information with same field values without using JOIN?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685134#M233798</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/205249"&gt;@karthi2809&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;after a stats command you have only the fields present in the stats command, so in your case you don't have priority and message fields that you would use in the evals after the stats.&lt;/P&gt;&lt;P&gt;Locate the eval before the stats and add the related fields to the stats.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 13:02:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-sets-of-information-with-same-field-values/m-p/685134#M233798</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-04-23T13:02:30Z</dc:date>
    </item>
  </channel>
</rss>

