Splunk Search

How to Evaluate a field from the list of another search and create a table

manorajk
Engager

There are two queries

`query 1` will give ID, TIME fields

`query 2` will give list of SPECIAL_ID

I want to create a table with TIME, ID, IS_SPECIAL_ID

IS_SPECIAL_ID is evaluated to true/false based on the condition where is ID is part of the list SPECIAL_ID

 

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Simplistically, you could do something like this

`query 1`
| join type=outer ID
  [search `query 2`
   | dedup SPECIAL_ID
   | rename SPECIAL_ID as ID
   | eval IS_SPECIAL_ID="true"]
| fillnull value="false" IS_SPECIAL_ID

However, as has been mentioned in numerous posts, using join and subsearches is not  always best practice due to the limitations of subsearches, but if the above suffices, it is a simple approach.

View solution in original post

manorajk
Engager

@ITWhisperer Really appreciate your help here.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Simplistically, you could do something like this

`query 1`
| join type=outer ID
  [search `query 2`
   | dedup SPECIAL_ID
   | rename SPECIAL_ID as ID
   | eval IS_SPECIAL_ID="true"]
| fillnull value="false" IS_SPECIAL_ID

However, as has been mentioned in numerous posts, using join and subsearches is not  always best practice due to the limitations of subsearches, but if the above suffices, it is a simple approach.

Get Updates on the Splunk Community!

Observability Highlights | November 2022 Newsletter

 November 2022Observability CloudEnd Of Support Extension for SignalFx Smart AgentSplunk is extending the End ...

Avoid Certificate Expiry Issues in Splunk Enterprise with Certificate Assist

This blog post is part 2 of 4 of a series on Splunk Assist. Click the links below to see the other ...

Using Machine Learning for Hunting Security Threats

REGISTER NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more ...