Splunk Search

How to compare a field from one sourcetype with another sourcetype then return the result in a new field?

Zerophage
New Member

Hello,

Hoping someone can help, I'm new to Splunk.

Lets say I have the following source types:
"event_alert" - contains an event with a username
"user_info" - contains information about users

Is there a way I can run a search which returns "event_alert" but with extra fields that are matched from "user_info". So I'm looking into "user_info" for a user name and if it exists, it then returns business unit, etc.

I thought of using eval but I cannot figure out how to reference fields from different sourcetypes something like the below doesn't work:

eval unit = if ("event_alert.user" == "user_info.username",business_unit,"unknown") 

Hope my question makes sense, let me know if i can elaborate.

Tags (3)
0 Karma

koshyk
Super Champion

hi, the efficient way to do this is (Assuming user and username are NOT present in the same sourcetype)

index=* (sourcetype=event_alert OR sourcetype=user_info) | eval unit = if (user == username,business_unit,"unknown") | stats count by unit

====

# Real life example would be
index=_internal (sourcetype=splunkd OR sourcetype=splunkd_access) |  eval unit=if(service_maxSizes==roll_hotBkt ,"hit","miss")| stats count by unit
0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...