Splunk Search

Splunk query using azure KQL concat

heskez
Engager

Hi there,

I am trying to get some data from MS Defender into a Splunk query. 

My original KQL query in azure contains | JOIN KIND INNER. to concat DeviceProcess and DeviceRegistry tables.

The Splunk app I am using: 

Splunk https://splunkbase.splunk.com/app/5518 

 

So basically I'd like to do concatenation between DeviceProcess and DeviceRegistry events in advanced hunting query | advhunt in splunk SPL. Is there a suitable Splunk query for this kind of purpose?

Labels (1)
0 Karma
1 Solution

KendallW
Contributor

Hi @heskez try using the join command:

<left-dataset> | join left=L right=R 
where L.pid = R.pid <right-dataset>

 https://docs.splunk.com/Documentation/SCS/current/SearchReference/JoinCommandOverview 

View solution in original post

0 Karma

KendallW
Contributor

Hi @heskez try using the join command:

<left-dataset> | join left=L right=R 
where L.pid = R.pid <right-dataset>

 https://docs.splunk.com/Documentation/SCS/current/SearchReference/JoinCommandOverview 

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...