Hi @bmanikya, at first Splunk isn't a database, so avoid to use join as usual for al of us coming from databases! there are other more efficient methods to correlate events from two searches. Anyw...
See more...
Hi @bmanikya, at first Splunk isn't a database, so avoid to use join as usual for al of us coming from databases! there are other more efficient methods to correlate events from two searches. Anyway, in your search there's a thing that I don't understand: in the second search you have: | table _time, App2 | search App2=App1 but after the table command, you have only those two fields, so, where do you take the app1 field' Anyway, try to redesign you searches using stats command and the join field as correlation key, something like this: (index=imdc_gold_hadoopmon_metrics sourcetype=hadoop_resourcemanager "Allocated new applicationId") OR (index=imdc_gold_hadoopmon_metrics sourcetype=hadoop_resourcemanager "OPERATION=Submit Application Request")
| rex "^(?:[^ \n]* ){4}(?P<App1>.+)"
| rex "^(?:[^=\n]*=){6}\w+_\d+_(?P<App2>.+)"
| eval
Time1=if(searchmatch("Allocated new applicationId"),strftime(_time,"%Y-%m-%d %H:%M"),""),
Time2=if(searchmatch("OPERATION=Submit Application Request"),strftime(_time,"%Y-%m-%d %H:%M"),""),
app=coalesce(app1,app2)
| stats
values(Time1) AS Time1
values(Time2) AS Time2
BY app
| table Time1, App1, Time2, App2 Ciao. Giuseppe