Splunk Search

Using Field Aliases

olavo123
Explorer

Just a small query: Lets say I need to find all values in one field in the access_logs matching values in some other fields:

For example a search like this:

Sourcetype="My_Custom_sourcetype" departure_city = return_city ...and so on..

We want to find all errors where the departure city and return city are the same.

Above we want to look at all values where dep_city equal values in return_city field. In SQL we normally use aliases for such joins. I have tried using FIELDALIAS but it does not seem to work. Would appreciate any help. Thanks.

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

I had a similar requirement and following worked for me:

Change

Sourcetype="My_Custom_sourcetype"  departure_city = return_city

to

Sourcetype="My_Custom_sourcetype" |where departure_city = return_city

View solution in original post

somesoni2
Revered Legend

I had a similar requirement and following worked for me:

Change

Sourcetype="My_Custom_sourcetype"  departure_city = return_city

to

Sourcetype="My_Custom_sourcetype" |where departure_city = return_city

olavo123
Explorer

Thanks so much. You are awesome.

0 Karma

crt89
Communicator

You should set what host/source/sourcetype you want to define your field alias
Then set something like this:
let say departure_city is on host1 and return_city is on host2

host=host1
departure_city = my_city_alias

create another one for return_city on host2

host=host2
return_city = my_city_alias

in your search:

host=host1 OR host=host2 my_city_alias="Some City"

This should return events with departure_city and return_city that are the same.
Hope this helps.

0 Karma

olavo123
Explorer

Thanks for the answer. This query is useful, if we are looking for pairs given a particular city, But in my case, I want to do it for all combinations.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...