<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to group various logs from different indexes with different field names, but same values? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200197#M58017</link>
    <description>&lt;P&gt;I am trying to group three sets of indexes' logs when all three have the same source and destination IP address within a minute of each other. My initial thought was to use  &lt;CODE&gt;transaction&lt;/CODE&gt;, but ran into a problem because the source IP in index-A is called 'dvc_ip'.  Is there a way to have transaction see the dvc_ip value of Index-A and match that with src_ip value of Index B &amp;amp; C?&lt;/P&gt;

&lt;P&gt;Ultimately, I'd like to join these logs together to then create a table (username, host_ip, src_ip, dest_ip, website, category, referrer).&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Log Field Setup&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Index-A    host_ip     dvc_ip    dest_ip    
Index-B                src_ip    dest_ip    website    referrer
Index-C                src_ip    dest_ip    website    category    username

// dvc_ip and src_ip are the same value, just named differently.  Indices B/C do not have the host_ip.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Sample Data&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Index-A    192.168.0.100     1.2.3.4    4.4.4.4    
Index-B                      1.2.3.4    4.4.4.4    amazon.com    google.com
Index-C                      1.2.3.4    4.4.4.4    amazon.com    shopping    jsmith
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 29 Sep 2020 08:47:15 GMT</pubDate>
    <dc:creator>DEAD_BEEF</dc:creator>
    <dc:date>2020-09-29T08:47:15Z</dc:date>
    <item>
      <title>How to group various logs from different indexes with different field names, but same values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200197#M58017</link>
      <description>&lt;P&gt;I am trying to group three sets of indexes' logs when all three have the same source and destination IP address within a minute of each other. My initial thought was to use  &lt;CODE&gt;transaction&lt;/CODE&gt;, but ran into a problem because the source IP in index-A is called 'dvc_ip'.  Is there a way to have transaction see the dvc_ip value of Index-A and match that with src_ip value of Index B &amp;amp; C?&lt;/P&gt;

&lt;P&gt;Ultimately, I'd like to join these logs together to then create a table (username, host_ip, src_ip, dest_ip, website, category, referrer).&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Log Field Setup&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Index-A    host_ip     dvc_ip    dest_ip    
Index-B                src_ip    dest_ip    website    referrer
Index-C                src_ip    dest_ip    website    category    username

// dvc_ip and src_ip are the same value, just named differently.  Indices B/C do not have the host_ip.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Sample Data&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Index-A    192.168.0.100     1.2.3.4    4.4.4.4    
Index-B                      1.2.3.4    4.4.4.4    amazon.com    google.com
Index-C                      1.2.3.4    4.4.4.4    amazon.com    shopping    jsmith
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:47:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200197#M58017</guid>
      <dc:creator>DEAD_BEEF</dc:creator>
      <dc:date>2020-09-29T08:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to group various logs from different indexes with different field names, but same values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200198#M58018</link>
      <description>&lt;P&gt;Why don't you use an alias to name your source ip with the same name across all your three indexes?&lt;BR /&gt;
Something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=Index-A OR index=Index-B OR index=Index-C
| eval source_ip = coalesce(dvc_ip, src_ip)
| transaction source_ip, dest_ip BLA BLA BLA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;By the way, transaction might not be accurate enough for what you are trying to achieve unless you can easily specify your startWith event and your endWith event.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 19:32:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200198#M58018</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2016-02-10T19:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to group various logs from different indexes with different field names, but same values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200199#M58019</link>
      <description>&lt;P&gt;I did not know about using an alias.  The time between the three logs are all within a 1-minute span.  Trying alias now.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 19:43:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-group-various-logs-from-different-indexes-with-different/m-p/200199#M58019</guid>
      <dc:creator>DEAD_BEEF</dc:creator>
      <dc:date>2016-02-10T19:43:36Z</dc:date>
    </item>
  </channel>
</rss>

