Splunk Search

How to compare a field from one sourcetype with another sourcetype then return the result in a new field?

Zerophage
New Member

Hello,

Hoping someone can help, I'm new to Splunk.

Lets say I have the following source types:
"event_alert" - contains an event with a username
"user_info" - contains information about users

Is there a way I can run a search which returns "event_alert" but with extra fields that are matched from "user_info". So I'm looking into "user_info" for a user name and if it exists, it then returns business unit, etc.

I thought of using eval but I cannot figure out how to reference fields from different sourcetypes something like the below doesn't work:

eval unit = if ("event_alert.user" == "user_info.username",business_unit,"unknown") 

Hope my question makes sense, let me know if i can elaborate.

Tags (3)
0 Karma

koshyk
Super Champion

hi, the efficient way to do this is (Assuming user and username are NOT present in the same sourcetype)

index=* (sourcetype=event_alert OR sourcetype=user_info) | eval unit = if (user == username,business_unit,"unknown") | stats count by unit

====

# Real life example would be
index=_internal (sourcetype=splunkd OR sourcetype=splunkd_access) |  eval unit=if(service_maxSizes==roll_hotBkt ,"hit","miss")| stats count by unit
0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...