Splunk Search

Can I search without using join?

mcaulsc
Path Finder

Hi,
I'm looking to improve performance and avoid the subsearch_maxout issue with a join on two source types.

I'm joining on a one to many field 'Correlator', srctypeA has will have one unique entry for 'Correlator' and srctypeB has multiple entries. So when my search on srctypeA returns a value for Correlator I want to timechart by a field in records with matching Correlator in srctypeB.

So the current search below works, I'm looking for better performing options if anyone has any suggestions.

index=index1 sourcetype=srctypeA field1=ABC* 
| join max=0 type=inner Correlator [ search index=index1 sourcetype=srctypeB ]
| timechart span=1d count by field2 
Labels (2)
0 Karma

isoutamo
SplunkTrust
SplunkTrust
0 Karma

mcaulsc
Path Finder

thanks,
thats is what I have been attempting and I get to the stats point ok with 121k events returned but trying to get the data into a timechart is eluding me at the moment.  

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Join has those limits (size of result set and timeout), which probably hits in your case.

Have you try Woodcock’s inner join example with stats and where? I suppose that it should help you.

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...