Splunk Search

How to link two events without loosing data?

keanderson
Engager

I am trying to link 2 events together due to information in the first event not showing in the second. the information is needed to filter the results. I have been trying to use transaction but in doing that I am loosing information needed to filter the end results-

 

eventA OR (eventB (amount>25 AND amount!=250 AND amount!="NONE"))
|transaction blue
|lookup C fieldD OUTPUT eggs
|search eggs>21
|table fieldD amount eggs blue

 

that is the basics of the search, the problem is that fieldD is only in eventA, amount only in eventB. After using transaction to link them, amount disappears and can't be used to filter.

Is there any other way to link the 2 events without loosing data within the events? 

Labels (1)
Tags (3)
0 Karma

keanderson
Engager

I think that would normally work but in this case it switched it so I was getting amount but not fieldD. I ended up using a lookup for an alternative. so far it is working. Thank you though! That is good information to know for other situations.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

If they have a common value, e.g. transaction id, you can use stats by

| eventstats values(fieldD) as fieldD values(amount) as amount by transactionId
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...