Splunk Search

Lookup against Splunk Search

rizzo75
Path Finder

I need to run a search, then run another search to calculate a specific value. Almost like a lookup with splunk commands.

search ... | fields id count

for each event run: search ... id=$id$ | eval count=$count$ | ... calculations ... | stats sum(n) as N

The output would have all values:

id    | count | N
------------------------
111 | 222     | 333

What is the best way to achieve this?

Thanks,

Joe

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Using your example, you could do this:

... | map maxsearches=42 [search ... id=$id$ | eval count = $count$ | ... calculations ... | stats sum(n) as N]

That'll give you up to 42 rows with a column N containing the sum. Depending on your calculations, it might be a lot faster to do something like this:

... | ... calculations, possibly involving some "by id" ... | stats sum(n) as N by id

View solution in original post

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Using your example, you could do this:

... | map maxsearches=42 [search ... id=$id$ | eval count = $count$ | ... calculations ... | stats sum(n) as N]

That'll give you up to 42 rows with a column N containing the sum. Depending on your calculations, it might be a lot faster to do something like this:

... | ... calculations, possibly involving some "by id" ... | stats sum(n) as N by id
0 Karma

rizzo75
Path Finder

I was able to achieve the necessary results using the map command, then joining back on the initial search.

earliest="-24h@h" latest="now" index=foo sourcetype=mysrc state=7 type!=9
| join type=outer usetime=True id [ search 
  index=foo sourcetype=mysrc state=7 type!=9
  | map maxsearches=500 search=" search
    index=bar sourcetype=othersrc … id = $id$
    | eval count=$count$
    | evals and such …
    | eval number=somenumber*othernumber
    | stats sum(number) as sum_number values(id) as id" ]
0 Karma

musskopf
Builder

Have a look on the map command... Provide some additional event data and expected results as vasanthmss mentioned to help writing the search.

0 Karma

vasanthmss
Motivator

provide some sample events and expected result
If possible provide the search query you are running.

V
0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...