Splunk Search

How to join 2 searches and control table output to remove rows with null field values?

edookati
Path Finder

I am using the below query to join 2 searches, but the table is showing me duplicate rows with only common_fields and null values in one_field one_field_tow one_field_three columns for these rows. Please let me know how to control the table output and remove all rows with one_field* null values.

sourcetype=one
| fields one_field one_field_two one_field_three common_field
| join common_field [ search sourcetype=two | fields common_field two_field_one, two_field_two ]
| table one_field one_field_two one_field_three two_field_one two_field_two common_field

Tags (4)
1 Solution

somesoni2
Revered Legend

Try this

sourcetype=one one_field=* one_field_two=* one_field_three=* common_field=*| fields one_field one_field_two one_field_three common_field | join common_field [ search sourcetype=two | fields common_field two_field_one, two_field_two ] | table one_field one_field_two one_field_three two_field_one two_field_two common_field

If there are still duplicates, try this

sourcetype=one one_field=* one_field_two=* one_field_three=* common_field=*| stats count by one_field one_field_two one_field_three common_field | fields - count| join common_field [ search sourcetype=two | stats count by common_field two_field_one, two_field_two | fields - count] | table one_field one_field_two one_field_three two_field_one two_field_two common_field

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Alternatively, try stats:

  sourcetype=one OR sourcetype=two
| stats values(1f1) as 1f1 values(1f2) as 1f2
        values(2f1) as 2f1 values(2f2) as 2f2 by common_field

lguinn2
Legend

And BTW, @martin_mueller's technique will be MUCH faster...

lguinn2
Legend

Or, even easier

sourcetype=one OR sourcetype=two
| stats values(*) as * by common_field

somesoni2
Revered Legend

Try this

sourcetype=one one_field=* one_field_two=* one_field_three=* common_field=*| fields one_field one_field_two one_field_three common_field | join common_field [ search sourcetype=two | fields common_field two_field_one, two_field_two ] | table one_field one_field_two one_field_three two_field_one two_field_two common_field

If there are still duplicates, try this

sourcetype=one one_field=* one_field_two=* one_field_three=* common_field=*| stats count by one_field one_field_two one_field_three common_field | fields - count| join common_field [ search sourcetype=two | stats count by common_field two_field_one, two_field_two | fields - count] | table one_field one_field_two one_field_three two_field_one two_field_two common_field
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...