Splunk Search

Join with different fields names.

brodde
Engager

Hi,

I'm trying to port some SQL queries we wrote to Splunk but whereas with SQL I can specify which columns to join whatever their names are I couldn't replicate that in Splunk.

Here's an attempt using aliases (rename didnt work either) :

   sourcetype="call"
    | join type=left callerID as userId
       [search sourcetype="user"
       | fields userId]
    | table event_id callerID userId

Thanks !

Tags (1)

martin_mueller
SplunkTrust
SplunkTrust

Rename certainly works.

If you have two sources like this:

user, field1
foo, value2

and like this:

userId, field2
foo, value2

you can do a search like this:

sourcetype=st1 | rename user as userId | join userId [search sourcetype=st2]

to get this:

userId, field1, field2
foo, value1, value2
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

[Puzzles] Solve, Learn, Repeat: Unmerging HTML Tables

[Puzzles] Solve, Learn, Repeat: Unmerging HTML TablesFor a previous puzzle, I needed some sample data, and ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...