Splunk Search

How to do cross-app join?

DrColombes
New Member

In Splunk 4.3 I want to do a join of an regex-extracted variable A (belonging to app/sourcetype a) with a variable B (belonging to app/sourcetype b).

I've tried several variations of something like this:

sourcetype="a" < ... extracted search for variable A ...> | rename A as C | join C
[ | rename sourcetypeb:B as C ]

but can't quite get the right answer (an inner join). Note the use of the qualifier soucetypeb:B to define the subsearch variable B. At least Splunk isn't complaining about a syntax error, so I think I'm on the right track.

(The subsearch hasn't run up against the 60-second limit.)

Thanks for any help you can offer.

0 Karma

Stephen_Sorkin
Splunk Employee
Splunk Employee

The typical way to do a join in splunk is via disjunction and stats, rather than relational join. For example:

(sourcetype=a ...) OR (sourcetype=b ...)
| eval c=if(sourcetype=="a", field_a, field_b)
| stats values(x) values(y) values(z) by c

Of course, you probably want to use the appropriate aggregator in the stats, to pick the fields that you're interested in and combine the (possibly) several values in the right way.

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...