Splunk Enterprise Security

Join two indexes without any unique field

charlesukah22
Explorer

I have two indexes that I need to join to get data from both of them, unfortunately there are no common values on both indexes. Is there a way to join these indexes together?

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @charlesukah22,
you can take logs from two indexes simply using both of them in the main search with OR operator:

index=indexA OR index=indexB
| ...

The problem is how to use these events if it isn't possible to correlate them and what to display.
At least you have to find something common between then and create a correlation using tags and eventtypes:
e.g. if you want the logfail events of two different systems, you could create two eventtypes:
e.g.:
windows_logfail index=wineventlog EventCode=4625
splunk_logfail index=_internal sourcetype=splunkd "login failed"
assign to both of them the same tag (e.g. LOGFAIL) (beware is case sensitive.
then create a search that displays logfails from both the indexes:

tag=LOGFAIL
| rex "user:\s+(?<user>[^ ]+)"
| eval kind=case(index="wineventlog","Windows", index="_internal","Splunk")
| table _time user kind

If you could share more infos I'd be more detailed.

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Announcing the 1st Round Champion’s Tribute Winners of the Great Resilience Quest

We are happy to announce the 20 lucky questers who are selected to be the first round of Champion's Tribute ...

We’ve Got Education Validation!

Are you feeling it? All the career-boosting benefits of up-skilling with Splunk? It’s not just a feeling, it's ...

What’s New in Splunk Cloud Platform 9.1.2308?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2308! Analysts can ...