Splunk Search

How to add join in one index

rj12
Loves-to-Learn Lots

This is the piece of code i tried so far but the join part is not working for me i don't know why 

((index="ata" sourcetype="s:sv" y_id>=4  te>= [| makeresults
|eval start_date=strftime(relative_time(now(), "-30d@d"),"%Y-%m-%dT%H:%M:%SZ") | fields start_date | return $start_date] earliest=-90d@d [|join type="inner" id [search index="ys_kb" sourcetype="lys:b_l" y_id>=4
ble=1 | dedup id | fields id |return id ]]) OR (index="s_ata" sourcetype="lys:h_xl" os=* earliest=-90d@d))
Labels (1)
0 Karma

renjith_nair
Legend

@rj12,

Probably you could explain what are you trying to achieve. There might be a better solution than Join

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

rj12
Loves-to-Learn Lots

Actually I want to use join in that particularly since the number of rows is more than 10,000

I tried using "inline search" but it not giving complete result Actually I was looking for the id that is  present in that index ="ys_kb" 

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...