Splunk Search

subsearch passing info

mcbradford
Contributor

I perform a serach that gives me a host name, but within the returned data the event does not contain the host_ip. Within the same index, a different type of event contains both values.

I think this can be done with a subsearch?

Is there any function within splunk to enrich the original event? Like a lookup?

Tags (1)
0 Karma

lguinn2
Legend

Try this

<your original search> | join hostname [search sourcetype=<other event type> | fields + host_id ]
0 Karma

MarioM
Motivator

easier than subsearch would be :

 <your search>  hostname=* host_ip=*

as it will only return event containing value in hostname AND in host_ip

Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...