Splunk Search

How to merge two tables to get result in one table

avi7326
Path Finder

How to get a single table from this query having all the correlationId together in one table

avi7326_0-1701776034776.png

 

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your join has already created a single table. However, you might want to consider including both sourcetypes and filters in the same initial search, then collate the events with a stats command.

0 Karma

avi7326
Path Finder

What else I can do to get the correlationId in one table as this query is comparing and giving the common results.

(sourcetype=bmw-crm-wh-sl-sfdc-subscribe-pe-int-api ("Received platform event for CUSTOMER"))

| table properties.correlationId

| join left=L right=R type=inner where L.properties.correlationId=R.properties.correlationId [search sourcetype=bmw-pl-customer-int-api ("recipient : *.ESOCRM") | table properties.correlationId]



And can I again you join in this query.

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
(sourcetype=bmw-crm-wh-sl-sfdc-subscribe-pe-int-api ("Received platform event for CUSTOMER")) OR (sourcetype=bmw-pl-customer-int-api ("recipient : *.ESOCRM")) | stats values by properties.correlationId
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...