12/3/2023 0 Comments Splunk join outerWhat is happening instead is I'm getting the above results but instead of db_name Albany being matched up to County Albany, the query has grabbed one database record and populated the entire list with it. Ive done a lot of messing around with this and this is the closest Ive gotten is with this search. The interesting field is db_name which corresponds exactly to the county name field. I am trying to join using 'Table' as common field, here is my query. 2.) indexdhcp 'Renew' (I am not sure how to search this WITH the SrcpIP field above) 3.) Return the combination of fields from both of these searches. One or more of the fields must be common to each result set. My query is looking through event logs to find a specific event, then parse the date down to a specific format and return that result next to the county name. Splunk Join TypeDescription: Options to the join command. Left or outer join: In this case it will bring all the fields from the 1st. My inputlookup csv file is just one column with a list of county names in it. Notes usage of splunk commands join it is very important command of splunk. I've done this in the past and it has worked perfectly but for some reason, in this case the data is not coming back as expected and I'm hoping someone can shine a light on the issue. The truth might be somewhere in the middle or in outer space, but VCs are here and. I'm trying to match the dates on specific event logs with an inputlookup file. Join Chris Bach, co-founder and CSO of Netlify to hear how they helped push.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |