Splunk Search

How do I join different events on an ID with different source types?

nikosattlermhp
Engager

Hello everybody,

I have many messages with two different source types and an ID and a information field. For every ID, there is one message from source 1 and one from source 2. I need to display to every ID the information field of both source types:

Example:

ID | Source 1 | Source 2 |

1 | info field from source 1 | info field from source 2 |
2 |info field from source 2 | null |

If there is no second event to an ID from the other source, "null" should be displayed.

How can I perform this join/combination?

My try:

index=myindex source1 | table id, infofield1 | join type=outer [search index=myindex source2 |table id, infofield2]

Thank you in advance!

Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Here's something to try.

index=myindex (source1 OR source2) | stats values(infofield1) as infofield1 values(infofield2) as infofield2 by id | fillnull infofield2
---
If this reply helps you, Karma would be appreciated.
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...