<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113495#M29867</link>
    <description>&lt;P&gt;I know I'm late to the party, just wanted to throw in one caution.&lt;/P&gt;

&lt;P&gt;It's interesting that &lt;CODE&gt;streamstats&lt;/CODE&gt; is actually faster than a &lt;CODE&gt;join&lt;/CODE&gt; or &lt;CODE&gt;append&lt;/CODE&gt; in this case.  I could see that working for a small amount of data, but I suspect that factors like data set size (of both the primary and secondary sources) as well as search mode (single server vs distributed) could have a significant impact on performance.&lt;/P&gt;

&lt;P&gt;The overall advice here is great, I just think it's prudent to point out that search commands like &lt;CODE&gt;transaction&lt;/CODE&gt;, &lt;CODE&gt;streamstats&lt;/CODE&gt;, and &lt;CODE&gt;eventstats&lt;/CODE&gt; require that ALL events be streamed to the search head which can have some significant network bandwidth and performance implications.  Compare this to &lt;CODE&gt;stats&lt;/CODE&gt; where map-reduce allows  the data to be precomputed on the indexers.  Bottom line, don't forget to look a the "remote search" and the "report search" in the job inspector.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Feb 2016 16:23:02 GMT</pubDate>
    <dc:creator>Lowell</dc:creator>
    <dc:date>2016-02-11T16:23:02Z</dc:date>
    <item>
      <title>How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113477#M29849</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;

&lt;P&gt;Now, this one bugs me for some time and this &lt;A href="http://answers.splunk.com/answers/129333/how-to-generate-a-third-table-with-join-command"&gt;question&lt;/A&gt; got my attention back to this topic.&lt;BR /&gt;
How can one compare fields over multiple source types without the use of &lt;CODE&gt;join&lt;/CODE&gt;, &lt;CODE&gt;append&lt;/CODE&gt; or any other &lt;CODE&gt;subsearch&lt;/CODE&gt;?&lt;/P&gt;

&lt;P&gt;I know, there some use cases where one has to use either of the above commands. But I don't want to and I don't need to, so what can be done?&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 11:28:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113477#M29849</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-03-31T11:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113478#M29850</link>
      <description>&lt;P&gt;&lt;CODE&gt;join&lt;/CODE&gt; or &lt;CODE&gt;append&lt;/CODE&gt; are the most intuitive direction to go in, but it's not very efficient and it's pretty cumbersome. &lt;/P&gt;

&lt;P&gt;I will show what can be done by using a run everywhere example. This will report on one field user which is available in both sourcetypes and some others group or run_time which is only available in one sourcetype.&lt;/P&gt;

&lt;P&gt;The use case here is to show which user, group and run_time we have per date_hour.&lt;/P&gt;

&lt;P&gt;Let's start with the obvious one: Have you met &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.2/SearchReference/Chart" target="_blank"&gt;&lt;STRONG&gt;chart&lt;/STRONG&gt;&lt;/A&gt;?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal earliest=-2h@h latest=-0h@h sourcetype=splunkd OR sourcetype=scheduler | chart values(user) AS user values(group) AS group values(run_time) AS run_time by date_hour
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The next obvious will be: Have you met &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.2/SearchReference/Stats" target="_blank"&gt;&lt;STRONG&gt;stats&lt;/STRONG&gt;&lt;/A&gt;?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal earliest=-2h@h latest=-0h@h sourcetype=splunkd OR sourcetype=scheduler | stats values(user) AS user values(group) AS group values(run_time) AS run_time by date_hour
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Now move on for some fancy stats stuff?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal earliest=-2h@h latest=-0h@h sourcetype=splunkd OR sourcetype=scheduler 
| eval hour-{sourcetype}=date_hour 
| stats values(hour-*) AS * values(user) AS user values(group) AS group values(run_time) AS run_time 
| mvexpand splunkd  
| mvexpand scheduler 
| where splunkd=scheduler 
| rename splunkd AS date_hour 
| fields - scheduler
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the eval on &lt;CODE&gt;hour-{sourcetype}=date_hour&lt;/CODE&gt; will create a new field which looks in this case like &lt;CODE&gt;hour-splunkd&lt;/CODE&gt; and &lt;CODE&gt;hour-scheduler&lt;/CODE&gt; which will be used later in the where clause....&lt;/P&gt;

&lt;P&gt;or another nice run everywhere example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal sourcetype="splunkd" OR sourcetype="splunk_web_access" | streamstats count by status, idx, sourcetype | stats values(idx) AS idx, values(status) AS status, values(sourcetype) AS sourcetype | mvexpand status | eval Status = if(match(idx,status), "MATCH", "NO MATCH") | table status, idx, Status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So why all this hustle and not use join instead? &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Because it is not neccesary to join all search just because you have different sources.&lt;/LI&gt;
&lt;LI&gt;Because you can use stats or chart for it. &lt;/LI&gt;
&lt;LI&gt;Because it will be faster.&lt;/LI&gt;
&lt;LI&gt;Because it is fun to challenge basic Splunk commands and do some tricks with them &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Just for the record, all the above example run on my laptop and Splunk 6 for about 2.5 seconds while the join to get the same result take about 4.5 seconds:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal sourcetype=splunkd earliest=-2h@h latest=-0h@h |  join date_hour [ search index=_internal sourcetype=scheduler earliest=-2h@h latest=-0h@h ] | stats values(date_hour) AS date_hour values(user) AS user values(group) AS group 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;One more thing: I know that &lt;STRONG&gt;in some use cases one is forced to use join or append&lt;/STRONG&gt;, but before that - just give &lt;STRONG&gt;stats&lt;/STRONG&gt; a chance .....&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:16:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113478#M29850</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2020-09-28T16:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113479#M29851</link>
      <description>&lt;P&gt;This answer is awesome @MuS&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113479#M29851</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2015-07-02T15:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113480#M29852</link>
      <description>&lt;P&gt;now it is correct &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113480#M29852</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-07-02T15:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113481#M29853</link>
      <description>&lt;P&gt;HeHe that is funny, is the 'raw' text it says &lt;CODE&gt;just give stats a chance&lt;/CODE&gt; but in the answer it is &lt;CODE&gt;append()&lt;/CODE&gt; ?!???&lt;/P&gt;

&lt;P&gt;For sure it should also say &lt;CODE&gt;...give stats a chance&lt;/CODE&gt; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113481#M29853</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-07-02T15:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113482#M29854</link>
      <description>&lt;P&gt;append0 a chance .... &lt;BR /&gt;
append0?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113482#M29854</guid>
      <dc:creator>0range</dc:creator>
      <dc:date>2015-07-02T15:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113483#M29855</link>
      <description>&lt;P&gt;I've occasionally found &lt;CODE&gt;eventstats&lt;/CODE&gt; to be particularly helpful as well.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113483#M29855</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2015-07-02T15:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113484#M29856</link>
      <description>&lt;P&gt;Agree this post is great. I'm slowly digesting it but I'm having a little trouble with how to extend to a three source scenario where pairs of the data match but not all three at once. For example...&lt;/P&gt;

&lt;P&gt;User: Name, City&lt;BR /&gt;
Activity: Id, Name, Action, Target&lt;BR /&gt;
Product: Id, Title, Type&lt;/P&gt;

&lt;P&gt;I want to select Name, City, Action, Title, Type where User.Name=Activity.Name and Activity.Target=Product.Id&lt;/P&gt;

&lt;P&gt;Can this be done with stats by extending one of the examples above?&lt;/P&gt;

&lt;P&gt;Ultimately what I'm trying to do is to show information about the Top 10 Products for a specific City and Action.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113484#M29856</guid>
      <dc:creator>kmcarrol</dc:creator>
      <dc:date>2015-07-02T15:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113485#M29857</link>
      <description>&lt;P&gt;You could use &lt;CODE&gt;eventstats&lt;/CODE&gt; to not-join the &lt;CODE&gt;City&lt;/CODE&gt; from &lt;CODE&gt;User&lt;/CODE&gt; to the &lt;CODE&gt;Name&lt;/CODE&gt; from &lt;CODE&gt;Activity&lt;/CODE&gt;, then &lt;CODE&gt;stats&lt;/CODE&gt; by &lt;CODE&gt;Id&lt;/CODE&gt; to not-join the &lt;CODE&gt;Activity&lt;/CODE&gt; with the &lt;CODE&gt;Product&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2015 15:25:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113485#M29857</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2015-07-02T15:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113486#M29858</link>
      <description>&lt;P&gt;@MuS -- Where you said, "the eval on hour-{sourcetype}=date_hour will create a new field which looks in this case like hour-splunkd and hour-scheduler which will be used later in the where clause...." I am wondering about that, because in the where clause it says, &lt;STRONG&gt;where splunkd=scheduler&lt;/STRONG&gt; so I don't understand that explanation.&lt;/P&gt;

&lt;P&gt;Another thing puzzling me is the *&lt;EM&gt;values(hour-&lt;/EM&gt;) AS *** in the stats command. I don't understand at all what that is doing.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 16:07:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113486#M29858</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-09-09T16:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113487#M29859</link>
      <description>&lt;P&gt;@wrangler2x &lt;BR /&gt;
HeHe, this can be really mind twisting, but it's not - let me explain:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval hour-{sourcetype}=date_hour
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;will create fields that are named &lt;CODE&gt;hour-splunkd&lt;/CODE&gt; or &lt;CODE&gt;hour-scheduler&lt;/CODE&gt; with the value of the corresponding &lt;CODE&gt;date_hour&lt;/CODE&gt; field of &lt;CODE&gt;splunkd&lt;/CODE&gt; or &lt;CODE&gt;scheduler&lt;/CODE&gt;. Next the &lt;CODE&gt;stats&lt;/CODE&gt; will use the &lt;CODE&gt;hour-*&lt;/CODE&gt; fields like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | stats values(hour-*) AS *
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and renames them into the value of star; &lt;CODE&gt;hour-splunkd&lt;/CODE&gt; becomes &lt;CODE&gt;splunkd&lt;/CODE&gt; and &lt;CODE&gt;hour-scheduler&lt;/CODE&gt; becomes &lt;CODE&gt;scheduler&lt;/CODE&gt; - Does that make sense?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 20:52:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113487#M29859</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-09-09T20:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113488#M29860</link>
      <description>&lt;P&gt;In addition try this simple Splunk&amp;gt; Fu search and you will see how &lt;CODE&gt;stats values(*) AS *&lt;/CODE&gt; works &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal earliest=-24h@h latest=-0h@h sourcetype=splunkd OR sourcetype=scheduler 
| stats values(sourcet*) AS Splunk&amp;gt;Fu-t* count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 20:54:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113488#M29860</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-09-09T20:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113489#M29861</link>
      <description>&lt;P&gt;Oh, that is twisted sister! Yes, makes perfect sense. I had no idea the star could be used that way. That's pretty wow, and I see how it allows you access to the data for the two sourcetypes.&lt;/P&gt;

&lt;P&gt;So, I take it then that when you do &lt;STRONG&gt;where splunkd=scheduler&lt;/STRONG&gt; that you are pairing the data_hour for each set of information?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 21:13:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113489#M29861</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-09-09T21:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113490#M29862</link>
      <description>&lt;P&gt;Okay, I think I missed something in the first explanation that is now cleared up (maybe!). So the use of brackets {} around an existing field yields the possible values for that field in that search in an eval. So you use those appended to something to create new field names to which you can assign anything I suppose, but date_hour in the example.&lt;/P&gt;

&lt;P&gt;So it seems that in the stats command (and perhaps elsewhere) use of a partial field name followed by a * will cause splunk to auto-complete all possible field names with that specified beginning.&lt;/P&gt;

&lt;P&gt;But in the rename Splunk&amp;gt;fu-t* it looks like the * autocompletes based on what ending was previously matched, which in this case is &lt;STRONG&gt;ype&lt;/STRONG&gt;.  Have I got it?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 21:37:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113490#M29862</guid>
      <dc:creator>wrangler2x</dc:creator>
      <dc:date>2015-09-09T21:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113491#M29863</link>
      <description>&lt;P&gt;@wrangler2x: correct.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 21:35:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113491#M29863</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-09-10T21:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113492#M29864</link>
      <description>&lt;P&gt;@wrangler2x, both is correct.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 21:41:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113492#M29864</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-09-10T21:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113493#M29865</link>
      <description>&lt;P&gt;Hi @MuS,&lt;/P&gt;

&lt;P&gt;After I POC the 3 of the method, I notice each of these are giving me different numbers of events.&lt;/P&gt;

&lt;P&gt;Stats give me 2967 events&lt;BR /&gt;
Chart give me 3296 events&lt;BR /&gt;
Join give me 3092 events&lt;/P&gt;

&lt;P&gt;Now I am questioning the accuracy of the methodology.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Sep 2015 06:32:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113493#M29865</guid>
      <dc:creator>imanpoeiri</dc:creator>
      <dc:date>2015-09-15T06:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113494#M29866</link>
      <description>&lt;P&gt;Again provide more Information and details and do it please in your other question.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Sep 2015 08:35:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113494#M29866</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-09-15T08:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113495#M29867</link>
      <description>&lt;P&gt;I know I'm late to the party, just wanted to throw in one caution.&lt;/P&gt;

&lt;P&gt;It's interesting that &lt;CODE&gt;streamstats&lt;/CODE&gt; is actually faster than a &lt;CODE&gt;join&lt;/CODE&gt; or &lt;CODE&gt;append&lt;/CODE&gt; in this case.  I could see that working for a small amount of data, but I suspect that factors like data set size (of both the primary and secondary sources) as well as search mode (single server vs distributed) could have a significant impact on performance.&lt;/P&gt;

&lt;P&gt;The overall advice here is great, I just think it's prudent to point out that search commands like &lt;CODE&gt;transaction&lt;/CODE&gt;, &lt;CODE&gt;streamstats&lt;/CODE&gt;, and &lt;CODE&gt;eventstats&lt;/CODE&gt; require that ALL events be streamed to the search head which can have some significant network bandwidth and performance implications.  Compare this to &lt;CODE&gt;stats&lt;/CODE&gt; where map-reduce allows  the data to be precomputed on the indexers.  Bottom line, don't forget to look a the "remote search" and the "report search" in the job inspector.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 16:23:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113495#M29867</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2016-02-11T16:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare fields over multiple sourcetypes without 'join', 'append' or use of subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113496#M29868</link>
      <description>&lt;P&gt;Can you apply this same method to search across multiple indices instead of multiple sourcetypes?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 14:05:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-fields-over-multiple-sourcetypes-without-join/m-p/113496#M29868</guid>
      <dc:creator>khubyarb</dc:creator>
      <dc:date>2016-06-30T14:05:41Z</dc:date>
    </item>
  </channel>
</rss>

