Splunk Search

Splunk query using azure KQL concat

heskez
Engager

Hi there,

I am trying to get some data from MS Defender into a Splunk query. 

My original KQL query in azure contains | JOIN KIND INNER. to concat DeviceProcess and DeviceRegistry tables.

The Splunk app I am using: 

Splunk https://splunkbase.splunk.com/app/5518 

 

So basically I'd like to do concatenation between DeviceProcess and DeviceRegistry events in advanced hunting query | advhunt in splunk SPL. Is there a suitable Splunk query for this kind of purpose?

Labels (1)
0 Karma
1 Solution

KendallW
Contributor

Hi @heskez try using the join command:

<left-dataset> | join left=L right=R 
where L.pid = R.pid <right-dataset>

 https://docs.splunk.com/Documentation/SCS/current/SearchReference/JoinCommandOverview 

View solution in original post

0 Karma

KendallW
Contributor

Hi @heskez try using the join command:

<left-dataset> | join left=L right=R 
where L.pid = R.pid <right-dataset>

 https://docs.splunk.com/Documentation/SCS/current/SearchReference/JoinCommandOverview 

0 Karma
Get Updates on the Splunk Community!

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...

Data Management Digest – January 2026

Welcome to the January 2026 edition of Data Management Digest! Welcome to the January 2026 edition of Data ...