<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Join fields from two indexes using fields that match partially in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191935#M55234</link>
    <description>&lt;P&gt;I'm not sure what end result you are trying to achieve, but you could probably use a calculated field...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eval match=if(like(URL, %vulnerabledomain%), 1, 0)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then, filter to match=1 and do your join on match. Or, you may not even need to perform a join, and can run stats, etc. off the calculated field.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Mar 2015 13:54:29 GMT</pubDate>
    <dc:creator>masonmorales</dc:creator>
    <dc:date>2015-03-24T13:54:29Z</dc:date>
    <item>
      <title>Join fields from two indexes using fields that match partially</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191932#M55231</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have two indexes one containing a list of webpages that has been accessed (Index A) and another containing a list of vulnerable sites/domains/files and their description(Index B).&lt;/P&gt;

&lt;P&gt;I would like to join these two indexes in order to see the vulnerable websites that have been accessed. A normal join operation doesn't quite cut it because the "value" field from index B can be a word that can appear anywhere in the "webpage" field of index A.&lt;/P&gt;

&lt;P&gt;Any idea how i can perform such a join ? &lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 12:34:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191932#M55231</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2015-03-23T12:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Join fields from two indexes using fields that match partially</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191933#M55232</link>
      <description>&lt;P&gt;Joins are expensive and should be avoided (if there are alternatives).&lt;/P&gt;

&lt;P&gt;If your indexB has fewer records (&amp;lt;1000 for example) you can try following&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=indexA sourcetype=sourcetypeA [search index=indexB sourcetype=sourcetypeB | stats count by value | table value | eval webpage="*".value."*" | table webpage ] 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Mar 2015 17:58:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191933#M55232</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-03-23T17:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: Join fields from two indexes using fields that match partially</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191934#M55233</link>
      <description>&lt;P&gt;Thank you for your reply... I was hoping I could avoid lookups to do this.. what do you think ? would it be possible to output the useful fields from the smaller index into CSV then use them a lookup ? if so how would I handle the &lt;CODE&gt;"*".value."*"&lt;/CODE&gt; ?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2015 13:17:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191934#M55233</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2015-03-24T13:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Join fields from two indexes using fields that match partially</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191935#M55234</link>
      <description>&lt;P&gt;I'm not sure what end result you are trying to achieve, but you could probably use a calculated field...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eval match=if(like(URL, %vulnerabledomain%), 1, 0)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then, filter to match=1 and do your join on match. Or, you may not even need to perform a join, and can run stats, etc. off the calculated field.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2015 13:54:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191935#M55234</guid>
      <dc:creator>masonmorales</dc:creator>
      <dc:date>2015-03-24T13:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Join fields from two indexes using fields that match partially</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191936#M55235</link>
      <description>&lt;P&gt;Here we are supposing that the same event contains both fields ? The two fields I wish to match are in different events so I have to join those 2 events based on whether a part of the key matches in both of them&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2015 11:40:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Join-fields-from-two-indexes-using-fields-that-match-partially/m-p/191936#M55235</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2015-04-10T11:40:20Z</dc:date>
    </item>
  </channel>
</rss>

