Splunk Search

How do I join different events on an ID with different source types?

nikosattlermhp
Engager

Hello everybody,

I have many messages with two different source types and an ID and a information field. For every ID, there is one message from source 1 and one from source 2. I need to display to every ID the information field of both source types:

Example:

ID | Source 1 | Source 2 |

1 | info field from source 1 | info field from source 2 |
2 |info field from source 2 | null |

If there is no second event to an ID from the other source, "null" should be displayed.

How can I perform this join/combination?

My try:

index=myindex source1 | table id, infofield1 | join type=outer [search index=myindex source2 |table id, infofield2]

Thank you in advance!

Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Here's something to try.

index=myindex (source1 OR source2) | stats values(infofield1) as infofield1 values(infofield2) as infofield2 by id | fillnull infofield2
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Learn Splunk Insider Insights, Do More With Gen AI, & Find 20+ New Use Cases You Can ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Buttercup Games: Further Dashboarding Techniques (Part 7)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Stay Connected: Your Guide to April Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...