Splunk Search

Self Join and override Values

akshaysaraf
Explorer

Need some help with a query

Sample Data:

 

{
	id: “123”,
	start_time: “2020-08-01 15:00:00”,
	end_time: “2020-08-01 16:00:00”,
	status: “FAIL”
}

{
	id: “124”,
	start_time: “2020-08-01 16:05:00”,
	end_time: “2020-08-01 16:30:00”,
	status: “SUCCESS”,
	original_id: “123”
}

 

Expected output (in table format) should only have 1 record:

idstart_timeend_timestatus
1232020-08-01 15:00:002020-08-01 16:30:00SUCCESS

 

This event shows data from id=123, but overrides some field like end_time and Status from latter event.

Goal : When we have data where id=original_id then we override some fields from latter event to former  event.

Labels (2)
0 Karma
1 Solution

to4kawa
Ultra Champion

your_search | spath | eval id = coalesce(original_id,id) | stats earliest(start_time) as start_time latest(end_time) as end_time latest(status) as status by id

View solution in original post

0 Karma

to4kawa
Ultra Champion

your_search | spath | eval id = coalesce(original_id,id) | stats earliest(start_time) as start_time latest(end_time) as end_time latest(status) as status by id

0 Karma

akshaysaraf
Explorer

That works, Thank you so much.

0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...