I have two sourcetypes with data as follows:
First sourcetype:
tx_id=1, event=error, extra=foo
tx_id=1, event=error, extra=bar
tx_id=2, event=info
tx_id=2, event=error, extra=baz
tx_id=3, event=info
Second sourcetype:
tx_id=1, url=/A
tx_id=2, url=/B
tx_id=3, url=/C
What I would like to get is a table with all error events from the first log, the particular extra info and the corresponding url from the second log. That is, (ideally) the result would be
extra=foo, url=/A
extra=bar, url=/A
extra=baz, url=/B
I know SQL fairly well and this would be a plain, simple "join". But I just cannot get this to work in Splunk with a | transaction (which will not give me the two rows in the tx_id=1 case), a | join or | stats .
As this must be really straightforward, I am probably missing the obvious and would appreciate any help or pointers.
Thanks a lot!
... View more