Splunk Search

I'm trying to search between 2 indexes that correlates field value to return back certain fields.

payton_tayvion
Path Finder

I'm trying to search between 2 indexes that correlates field value to return back certain fields.

For example index a has the fieldname named src_ip and index b has a fieldname named src. The values are the same, but the fieldname are different. I want to use these values to correlate the data, but I want to also return field names that aren't in index a, but located in index b.

 

Here's my current quey.

 

index=a categories="media"
| where bytes_out > bytes_in 
| fields _time, cs_user, src_ip, cs_auth_group, cs_host, cs_method, status, bytes_in, bytes_out, cs_User_Agent
| eval src=src_ip
| join src
    [ search index=b 
    | fields log_subtype, cat]

 

Labels (2)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @payton_tayvion,

You should keep src field on subsearch in order to be able to join. Please try below;

index=a categories="media"
| where bytes_out > bytes_in 
| fields _time, cs_user, src_ip, cs_auth_group, cs_host, cs_method, status, bytes_in, bytes_out, cs_User_Agent
| eval src=src_ip
| join src
    [ search index=b 
    | fields src, log_subtype, cat]
If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...