Splunk Search

any way to combine the results from two sourcetypes without a common field to use for a join and then table the output?


I need to produce an extract to use as a data source for a third party application. The application needs the data in a csv format and required data from two sourcetypes. I can search for one sourcetype and then append the second search, but the tabled output is uneven. Here is an example - I need for two data sets to be merged.

index=os host=xxxxxxx sourcetype=puppet_facts | dedup host | append [search index=os host=xxxxxxx sourcetype=package | multikv | dedup VENDOR,NAME,VERSION ] | table host,Domain,server,manufacturer,User,operatingsystem,VENDOR,NAME,VERSION

needed output format - host,Domain,server,manufacturer,User,operatingsystem,VENDOR,NAME,VERSION - (i am ignoring the Domain and User field right now )


host01          Cisco Systems Inc       RedHat           
host01                                                         Red Hat, Inc.    redhat-lsb          4.0
host01                                                                Red Hat, Inc. infinipath-psm  3.0.1

How do I combine the output for row and 2 for every result to like this?

host01          Cisco Systems Inc       RedHat       Red Hat, Inc.  redhat-lsb          4.0  
host01          Cisco Systems Inc       RedHat           Red Hat, Inc.  infinipath-psm  3.0.1                                

Also - is it possible to hardcode certain values? For example


so the output would be

host01 Domain server     Cisco Systems Inc User RedHat Red Hat, Inc.    redhat-lsb 4.0   

Thanks for any feedback!

Tags (3)
0 Karma


Without a little bit of sample data, this is what I think would work (non-tested, kid approved)

index=os host=xxxxxxx sourcetype=puppet_facts OR sourcetype=package | multikv | stats latest(Domain) as Domain latest(...) as ... by host, NAME, VERSION

Replace the ... with the rest of your fields listed, one by one. This will give you an aggregation by NAME and VERSION and host. This also reduces the number of searches from 2 to 1, which is helpful for speed and optimization.

0 Karma


To answer the hardcode-values-subquestion, sure:

... | eval manufacturer = "Cisco Systems Inc" | ...
0 Karma
Get Updates on the Splunk Community!

Observability | How to Think About Instrumentation Overhead (White Paper)

Novice observability practitioners are often overly obsessed with performance. They might approach ...

Cloud Platform | Get Resiliency in the Cloud Event (Register Now!)

IDC Report: Enterprises Gain Higher Efficiency and Resiliency With Migration to Cloud  Today many enterprises ...

The Great Resilience Quest: 10th Leaderboard Update

The tenth leaderboard update (11.23-12.05) for The Great Resilience Quest is out >> As our brave ...