Splunk Search

How to extract 2 values from different events based on another 2 common fields?

BYQ
Engager

Hello,
I'm new here, tried to find the answer for my problem by failed. I'm looking for a method to extract values from 2 different events. These events have some common fileds but I'm not interested in them being part of output.

My events have following fields (there are more, but these I would like to operate on):

EventID=10001

time=_time

user=mike

vlan=mikevlan

EventID=10002

time=_time

user=mike

L2ipaddress=1.2.3.4

What I'm looking at as a result is a table with a combined results from vlan and L2ipaddress columns for which user and time matches then I need to have a list of all vlans grouped by L2ipaddress

1.2.3.4|mikevlan,tomvlan,anavlan

1.2.3.5|brianvlan,evevlan
etc

Any ideas?

Labels (5)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| stats values(vlan) as vlan values(L2ipaddress) as L2ipaddress by _time user
| stats values(vlan) as vlan by L2ipaddress
| eval vlan=mvjoin(vlan,",")

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats values(vlan) as vlan values(L2ipaddress) as L2ipaddress by _time user
| stats values(vlan) as vlan by L2ipaddress
| eval vlan=mvjoin(vlan,",")
0 Karma

BYQ
Engager

ITWhisperer - wow! that worked. And the solution is even easier than I thought. I'm greatly appreciated!

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...