Splunk Search

How to do cross-app join?

DrColombes
New Member

In Splunk 4.3 I want to do a join of an regex-extracted variable A (belonging to app/sourcetype a) with a variable B (belonging to app/sourcetype b).

I've tried several variations of something like this:

sourcetype="a" < ... extracted search for variable A ...> | rename A as C | join C
[ | rename sourcetypeb:B as C ]

but can't quite get the right answer (an inner join). Note the use of the qualifier soucetypeb:B to define the subsearch variable B. At least Splunk isn't complaining about a syntax error, so I think I'm on the right track.

(The subsearch hasn't run up against the 60-second limit.)

Thanks for any help you can offer.

0 Karma

Stephen_Sorkin
Splunk Employee
Splunk Employee

The typical way to do a join in splunk is via disjunction and stats, rather than relational join. For example:

(sourcetype=a ...) OR (sourcetype=b ...)
| eval c=if(sourcetype=="a", field_a, field_b)
| stats values(x) values(y) values(z) by c

Of course, you probably want to use the appropriate aggregator in the stats, to pick the fields that you're interested in and combine the (possibly) several values in the right way.

Get Updates on the Splunk Community!

Video | Welcome Back to Smartness, Pedro

Remember Splunk Community member, Pedro Borges? If you tuned into Episode 2 of our Smartness interview series, ...

Detector Best Practices: Static Thresholds

Introduction In observability monitoring, static thresholds are used to monitor fixed, known values within ...

Expert Tips from Splunk Education, Observability in Action, Plus More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...