Splunk join two searches. Eg: | join fieldA fieldB type=outer - See join on docs. Splunk join two searches

 
 Eg: | join fieldA fieldB type=outer - See join on docsSplunk join two searches Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs

Full of tokens that can be driven from the user dashboard. If NEIGHBOR_ADDR from the first stats has more than one value, you have to add. SRC IP above comes from a pool, and can be reassigned to another user, if it's not being used by anyone else at the time. The results will be formatted into something like (employid=123 OR employid=456 OR. Join two searches and draw them on the same chart baranova. total) in first row and combined values in second search in second row after stats. Splunk – Environment . Instead, search a will run from -7d@d up to now (search b will use the explicit time range given). The following command will join the two searches by these two final fields. 30. With this search, I can get several row data with different methods in the field ul-log-data. You will have to use combinations of first (), last (), min (), max () or values () etc for various fields that you want to work on after correlation. I tried using coalesce but no luck. com/answers/526074/… – Tsakiroglou Fotis Aug 17, 2018 at 16:03 Add a comment 2 Answers Sorted by: 8 Like skoelpin said, I would. [R] r ON q. The join command is used to combine the results of a sub search with the results of the main search. The most common use of the “OR” operator is to find multiple values in event data, e. Are you sure there isn't anything you're leaving out of your examples ? I've updated my question to include a flowchart. COVID-19 Response SplunkBase Developers DocumentationAh sorry in my test search I had just status. Table 1 userid, action, IP Table2 sendername, action, client_IP Query : select Table1. Where the command is run. Add in a time qualifier for grins, and rename the count column to something unambiguous. Splunkers! I need to join the follow inputlookup + event searche in order to have, for each AppID, the full set of month buckets given from the time range picker Example: Search 1 (Fromm inputlookup): App1 App2. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Following is a run anywhere example using Splunk's _internal index:DO NOT USE the transaction command; try this: index=process_log AND ((MSGNUM="START-PROCESS" OR MSGNUM="END-PROCESS") ANDHi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. . Splunk Pro Tip: There’s a super simple way to run searches simply. g. Can you please add sample data from two index that are to be correlated? Also, do you know whether the field extractions for indexA and indexB been created by you/your team or are they built. In your case you will just have the third search with two searches appended together to set the tokens. Splunk query to join two searches asharmaeqfx. ravi sankar. g. Here is how I would go about it; search verbose to try an get to a single record of source you are looking to join. join on 2 fields. index="job_index" middle_name="Foe" | join type=left job_title [search index="job_index" middle_name="Stu"] If there is always one event being used from each dataset then appendcols may perform better. BrowseHi o365 logs has all email captures. left join with field 1 from index2 if field1!=" " otherwise left join with field 2 from index 2. . When you run a search query, the result is stored as a job in the Splunk server. csv contains the values of table A with field name f1 and tableb. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. index=someindex queryType="ts" filename= RECON status=1| dedup filename |rename filename as Weekly| join queryType [search index=someindex queryType="ts" filename= PNASC. Communicator ‎02-24-2016 01:48 PM. Suggestions: "Build" your search: start with just the search and run it. Unfortunately this got posted by mistake, while I was editing the question. Hi, It's been more than a week that I am trying to display the difference between two search results in one field using the "| set diff" command diff. your base search fetching both type of events | eval host_name=coalesce(mail_srv,srv_name)Solved: Hi, I wonder whether someone may be able to help me please. Let’s take an example: we have two different datasets. . One approach to your problem is to do the. ”. | savedsearch "savedsearch1" | eval flag="match" | rename _time as time1 | append maxtime=1800 timeout=1800 [ savedsearch "savedsearch2" | eval flag="metric" | re. Then you add the third table. Union the results of a subsearch to the results of the main search. I want to be able to sort the list (A) of files by a user id, and correlate back to a departme. The right-side dataset can be either a saved dataset or a subsearch. I'm using the following searches: Search 1 - "EI Auth" Auth - index="main" auditSource=*auth* auditType=LoginEntitlements detail. SplunkTrust. Tags: eventstats. Hi @jerrytao, consider your Search1 with table result -> * A | B * and your Search2 with table result -> A | C | D , try this below to join COVID-19 Response SplunkBase Developers Documentation BrowseSo, I figured that if I use eval to rename the field in the first search, it should match the corresponding field in the second search when using a join. We need to match up events by correlationId. For flexibility and performance, consider using one of the following commands if you do not require join semantics:. . index=sendmail earliest="@d-2h" latest="@d+10h" | append [ search index=sendmail earliest="@d+10h" latest="@d. I have two lookup tables created by a search with outputlookup command ,as: table_1. So let’s take a look. Generating commands fetch information from the datasets, without any transformations. I mean, I agree, you should not downvote an answer that works for some versions but not for others. 51 1 1 3 answers. Fields: search 1 -> externalId search 2 -> _id. . The issue is the second tstats gets updated with a token and the whole search will re-run. 0 One-Shot Adventure. 04-07-2020 09:24 AM. The most common use of the “OR” operator is to find multiple values in event data, e. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. In the perfect world the top half does'tre-run and the second tstat. So you do not want to "combine" results of the two queries into one, just to apply some additional conditions to the o365 search, conditions used in the mail search that haven't been applied in the o365 search. I've to combine the data in such a way that if there is duplicate then the data from idx1 must be prioritized over data from idx2; i. amazing!!. method ------------A-----------|---------------1------------- ------------B. This approach is much faster than the previous (using Job Inspector). From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Hi @jerrytao , The easiest way to do this would be to use a join command: index=cosv2 ul-ctx-source=c4rupgrd source="FunctionHandler@*" Community. @ITWhisperer @scelikok @soutamo @saravanan90 @thambisetty @gcusello @bowesmana @to4kawa @woodcock Please help here. pid <right-dataset> This joins the source data from the search pipeline. In addition, transaction and join aren't performant commands, so it's better to replace with stats command, somethimes l. For example, I am seeing time mismatches in the _time value between chart columns (some being incorrect). COVID-19 Response SplunkBase Developers Documentation. Splunk is an amazing tool, but in some ways it is surprisingly limited. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. You can. You have _time, client_ip, client_name And I don't know why you'reThanks, I was looking for this oneYes, you have correctly used stats, to join (integrationName="Opsgenie Edge Connector - Splunk" alert. CC {}, and ExchangeMetaData. The reasons to avoid join are essentially two. . Search 3 will be the adhoc query you run to lookup the data. If no fields are specified, all fields that are shared by both result sets will be used. Learn more about Teams Get early access and see previews of new features. Join datasets on fields that have the same name. . 1 Answer. Splunk Platform Products; Splunk Enterprise; Splunk Cloud; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium Solutions; IT Ops Premium Solutions; DevOps Premium Solutions; Apps and Add-ons; All Apps and Add-ons; Discussions. bowesmana. The issue is the second tstats gets updated with a token and the whole search will re-run. Splunk Search cancel. It is built of 2 tstat commands doing a join. 20 46 user1 t2 30. With drill down I pass the 'description' by a token to the search that has to combine the search into a table. 0 Karma. . g. Please see thisI need to access the event generated time which splunk stores in _time field. In the lookup there is Gmail, in recipient email, it will shows the results. Hello, this is the full query that I am running. Example: | strcat allrequired=f email "|" uname "|" secondaryuname identity. I currently try to do a splunk auditing by searching which user logged into the system using some sort of useragent and so on. COVID-19 Response SplunkBase Developers Documentation. yesterday. ( verbs like map and some kinds of join go here. . The Basics of Regex The Main Rules ^ = match beginning of the line $ = match end of the line. However in this case the common string between the 2 queries is not a predefined splunk field and is logged in a different manner. In general is there any way to dynamically manipulate from the main search the time range (earliest latest) that the 2nd search will. The logical flow starts from a bar char that group/count similar fields. . a. 344 PM p1. The results will be formatted into something like (employid=123 OR employid=456 OR. The where command does the filtering. If that common field (in terms of matching values) is mail_srv/srv_name, then try like this. Browse@damode, The event from indexA has userid=242425 however, I do not see 242425 value in the event from indexB. join Multisearch Union OR boolean operator The most common use of the OR operator is to find multiple values in event data, for example, “foo OR bar. You must separate the dataset names. I'm trying to join two searches where the first search includes a single field with multiple values. 20. I am trying to find top 5 failures that are impacting client. This is a run anywhere example of how join can be done. If you want to learn more about this you can go through this blog Splunk Search Commands. where (isnotnull) I have found just say Field=* (that removes any null records from the results. EnIP = r. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. I suspect that @somesoni2 will slow down once he crosses 100K but I though that he would slow down when he solidly grabbed the #1 slot and he didn't. sekhar463. | set diff [ search index=idx2 sourcetype=src | dedup A ] [search index=idx1 sourcetype=src | dedup A ] | stats count BY index A | table index A. How to join 2 indexes. If the Search Query-2 "Distinct users" results are greater than 20 then, I want to ignore the result. I want to use result of one search into another. | join type=left key [base search] I trued and if hard code the 2 searches together with the 2nd search in left join with the base search it work perfectly. COVID-19 Response SplunkBase Developers Documentation. The first search result is : The second search result is : And my problem is how to join this two search when. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. |inputlookup COVID-19 Response SplunkBase Developers Documentation BrowseHi, I hope you're at 6. Index name is same for both the searches but i was using different aggregate functions with the search . index=_internal earliest=-4h | stats count by index sourcetype | join type=inner index [search index=_internal source=*metrics. Splunk. Use the join command to combine the left-side dataset with the right-side dataset, by using one or more common fields. . the same set of values repeated 9 times. I do not think this is the issue. ravi sankar. 1. Then, after the join I do: eval diff_times=time_in-time_reg | search diff_times>=0 AND diff_times<600000. 1 Answer. Please hep in framing the search . To make the logic easy to read, I want the first table to be the one whose data is higher up in hierarchy. k. P lotting two time-series in a single chart is a question often asked by many of our customers and Answers users. I saw in the doc many ways to do that (Like append. Subscribe to Support the channel: help? Message me on LinkedIn: efficient way is to do a search looking at both indexes, and look for the events with the same values for uniqueId. I have two searches which have a common field say, "host" in two events (one from each search). The union command appends or merges event from the specified datasets, depending on whether the dataset is streaming or non-streaming and where. See the syntax, types, and examples of the join command, as well as the pros and. One of the datasets can be a result set that is then piped into the unioncommand and merged with a. I tried the below query but it results 0 events: Index=A sourcetype=signlogs outcome=failure. StIP AND q. 344 PM p1. まずはSplunk中級者?がハマりがちなsubsearchs、join、append、inputlookupの制限をチェック Splunk Version 8. Path Finder. hi only those matching the policy will show for o365. You&#39;re essentially combining the results of two searches on some common field between the two data COVID-19 Response SplunkBase Developers Documentation@jnudell_2 , thank you so much! It works after reverse this 2 searches. INNER JOIN [SE_COMP]. I have two searches which have a common field say, "host" in two events (one from each search). BrowseI am trying to join two searches based on closest time to match ticketnum with its real event e. You can use the union command at the beginning of your search to combine two datasets or later in your search where you can combine the incoming search results with a dataset. I can't combine the regex with the main query due to data structure which I have. Logline 1 -. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Splunk Search cancel. Watch now!Since the release of Splunk SOAR 6. I know that this is a really poor solution, but I find joins and time related operations quite. Auto-suggest helps you quickly narrow down your search results by suggesting possible. Click Search: 5. I have then set the second search. Reply. And write them so that they are sending back ALL the materials you need at the same time, rather than having to have the head librarian compile things, then ask again. Write a single search to show two records to join; I am assuming you are not masking your intended search and index, and NOT somefield 1 2 is common across both searches: 2. Run a pre-Configured Search for Free . BrowseCOVID-19 Response SplunkBase Developers Documentation. pid <right-dataset> This joins the source data from the search pipeline with the right-side dataset. Tags: eventstats. g. index="job_index" middle_name="Foe" | appendcols [search index="job. But if the search Query 2 LogonIP<20 then, I want to join the result with Query 1 and get the result. It sounds like you're looking for a subsearch. I tried both of these Hi, I have 2 queries which do not have anything in common, how ever i wish to join them can somebody help : query 1 : index=whatever* Solved: I have these two searches below and I want to join the fieldname Path from the first query to the second query using the machine as the SplunkBase Developers Documentation Browse The most common use of the OR operator is to find multiple values in event data, for example, “foo OR bar. it works! thanks for pointing out that small details. in Splunk join is used to correlate two (or more ) searches using one or more common keys and take fields from both the searches. 2nd Dataset: with two fields – id,director [here id in this dataset is same as movie_id in 1st dataset] So let’s start. join does indeed have the ability to match on multiple fields and in either inner or outer modes. Post Reply Related Topics. Syntax The required syntax is in bold . Join two searches together and create a table. Splunk Data Fabric Search; Splunk Premium Solutions. Security & the Enterprise; DevOps &. 02-24-2016 01:48 PM. There are often several ways to get the same result in Splunk - some more performant than others - which is useful in large data sets. Consider two tables user-info and some-hits user-info name ipaddress time user1 20. I tried to use the NOT command to get the events from the first search but not in the second (subsearch) but in the results, I noticed events from the second search (subsearch). Communicator. Hi All, I have a scenario to combine the search results from 2 queries. Splunk: Trying to join two searches so I can create delimters and format as a. ) and that string will be appended to the main search. How to combine two queries in Splunk?. The issue is the second tstats gets updated with a token and the whole search will re-run. I have the following two searches: index=main auditSource="agent-f" Solution. pid = R. . d,e,fSolved: I have two searches: search-A gives values like type status hostname id port Size base cache OFF host-1 17 NA NA NA NA ON host-1 6. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Try this (won't be efficient) your first search get user sessions | join max=0 SRC [search your second search to get IPTable data | rename _time as iptabletime ] | rename COMMENT as "Above join will get all records for that SRC in the main search so youll now apply filter to keep relevant rows" | wh. However, the OR operator is also commonly used to combine data from separate sources, for example (sourcetype=foo OR sourcetype=bar OR sourcetype=xyz). Field 2 is only present in index 2. Splunk Platform Products; Splunk Enterprise; Splunk Cloud; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium Solutions; IT Ops Premium Solutions; DevOps Premium Solutions; Apps and Add-ons; All Apps and Add-ons; Discussions. First one logs all the user sessions with user name, src ip, dst ip, and login/logout time. You will need to replace your index name and srcip with the field-name of your IP value. The first part of the output table (start, end connId, clientIP) gives 9 lines from Search 1. ip=table2. The left-side dataset is the set of results from a search that is piped into the join command. BCC{}; the stats function group all of their value. Solution. The multisearch command is a generating command that runs multiple streaming searches at the same time. The means the results of a subsearch get passed to the main search, not the other way around. Merges the results from two or more datasets into one dataset. However, in this case the answer was not "here's an answer that works for version X" or "you can't do this in version X and below" (in which case downvoting would have been incorrect) but the answer was "there is not a solution to this problem. In the perfect world the top half does'tre-run and the second tstat re-use the 1st half's data from the original run. I want to join the two and enrich all domains in index 1 with their description in index 2. I will try it. The event time from both searches occurs within 20 seconds of each other. (sourcetype=foo OR sourcetype=bar OR sourcetype=xyz). The raw data is a reg file, like this:. There need to be a common field between those two type of events. The following example merges events from the customers and orders index datasets, and the vendors_lookup dataset. 1 Answer. Security & the Enterprise; DevOps &. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. 20. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. In general is there any way to dynamically manipulate from the main search the time range (earliest latest) that the 2nd search will. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Description: The traditional join command joins the results from the main results pipeline with the search pipeline results provided as the last argument. 20. . Generally, after getting data into your Splunk deployment, you want to: Investigate to learn more about the data you just indexed or to find the root cause of an issue. Yes, the data above is not the real data but its just to give an idea how the logs look like. But when i ran it with stats the statistics shows up in theYou don't say what the current results are for the combined query, but perhaps a different approach will work. In Inner Join we join 2 dataset tables which is table A and B and the matching values from those. and use the last where condition to take only the ones present in all tables. BrowseMonitoring Splunk; Using Splunk; Splunk Search; Reporting; Alerting; Dashboards & Visualizations; Splunk Development; Building for the Splunk Platform; Splunk Platform Products; Splunk Enterprise; Splunk Cloud Platform; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions;Hi rajatsinghbagga, too good! if this answer solves your problems, please, accept and/ot upvote it. SSN=* CALFileRequest. This tells the program to find any event that contains either word. both shows the workstations in environment (1st named as dest from symantec sep) & (2nd is named. eg. See Initiating subsearches with search commands in the Splunk Cloud Platform Search Manual. COVID-19 Response SplunkBase Developers Documentation. But in your question, you need to filter a search using results from other two searches and it's a different thing:. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. 4. I need to combine both the queries and bring out the common values of the matching field in the result. Union events from multiple datasets. However, the “OR” operator is also commonly used to combine data from separate sources, e. | inputlookup Applications. I can create the lookup for one of the queries and correlate the matching field values in the second query but trying to do without lookup within. and Field 1 is common in . . hi let me make it easier for you to understand , | lookup email_domain_whitelist domain AS RecipientDomain output domain as domain_match |. conjuction), which is the reason of a better search speed. 06-19-2019 08:53 AM. Get all events at once. index=mysearchstring2 [ search index=mysearchstring1 | fields employid | format ] Splunk will run the subsearch first and extract only the employid field. And I've been through the docs. . You can use other techniques, such as searching for all the data in a single search and then manipulating it with eval/stats to get to your desired output, but need more info on that. But this discussion doesn't have a solution. Event 1 is data related to sudo authentication success logs which host and user name data . I've been unable to try and join two searches to get a table of users logged in to VPN, srcip, and sessions (if logged out 4911 field). Using Splunk: Splunk Search: Join two searches together and create a table; Options. Hi, I wonder whether someone may be able to help me please. join. Step 2: Use the join command to add in the IP addresses from the blacklist, including every IP address that matches between the two changes from a 0 to a 1. In the perfect world the top half does'tre-run and the second tstat re-use the 1st half's data from the original run. For flexibility and performance, consider using one of the following commands if you do not require join semantics: lookup command. LoggerSorry for being unclear, an example request with response (entries which i can find with my searches): 85a54844766753b0 is a correlationId Request COVID-19 Response SplunkBase Developers DocumentationSolved: Hi , I want to join two searches without using Join command ? I don't want to use join command for optimization issue. 20 50 (10 + 40) user2 t1 20. index=monitoring, 12:01:00 host=abc status=down. One thing that is missing is an index name in the base search. ip=table2. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. index=o365 " Result of Query-1 LogonIP " earliest=-30d | stats dc (user) as "Distinct users". Enter them into the search bar provided, including the Boolean operator AND between them. ) and that string will be appended to the main. . I can clarify the question more if you want. So I need to join two searches on the basis of a common field called uniqueID. Having high number of results in first search is perfectly fine, but the problem is with second search which is also called sub search. My 2nd search gives me the events which will only come in case of Logged in customer. The left-side dataset is the set of results from a search that is piped into the join. 20. . New Member ‎06-02-2014 01:03 AM. The events that I posted are all related to var/logs . type . type . Hello, I have two searches I'd like to combine into one timechart. etc. Option 1: Use combined search to calculate percent and display results using tokens in two different panels. Description: The traditional join command joins the results from the main results pipeline with the search pipeline results provided as the last argument. Splunk. I have set the first search which searches for all user accounts: |rest /services/authentication/users splunk_server=local |fields title |rename title as user. Outer Join (Left) Above example show the structure of the join command works. You can use the join command to combine the results of a main search (left-side dataset) with the results of either another dataset or a subsearch (right-side dataset). From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. uniqueId=* (index=index1 OR index=index2) | stats dc (index) AS distinctindexes values (index) values (username) AS username by uniqueId | where distinctindexes>1. 0. Splunk offers two commands — rex and regex — in SPL. log group=per_index_thruput earliest=-4h | stats sum (kb) as kb by series | rename series as index ] | table index sourcetype kb. csv. We can join two searches with no command fields by creating a field alias so both the externalid and _id can map per a. I'm trying to join 2 lookup tables. Now i use the second search as as a COVID-19 Response SplunkBase Developers DocumentationIt's another Splunk Love Special! For a limited time, you can review one of our select Splunk products through Gartner Peer Insights and receive a $25 Visa gift card! Review: SOAR (f. Lets make it a bit more simple. 30 t2 some-hits ipaddress hits time 20. I am new to splunk and struggling to join two searches based on conditions . join command is an option, but should rarely be the first choice, as 'join' has limitations and is not really the way to do this sort of task in Splunk worldThese are all events from Splunk Nix TA add-on which gives var/logs top , ps etc logs . One of the datasets can be a result set that is then piped into the union command and merged with a second dataset. index="job_index" middle_name="Foe" | join type=left job_title [search index="job_index" middle_name="Stu"] If there is always one event being used from each dataset then appendcols may perform better. userid, Table1. Generally, after getting data into your Splunk deployment, you want to: Investigate to learn more about the data you just indexed or to find the root cause of an issue. I tried to use the NOT command to get the events from the first search but not in the second (subsearch) but in the results, I noticed events from the second search (subsearch). Explorer. yea so when i ran the serach with eventstats no statistics show up in the results. The "inner" query is called a 'subsearch' and the "outer" query is called the "main search". The three rex commands extract the desired fields then the stats command puts the^ this guy wants to catch up to somesoni so badly :-D. By Splunk January 15, 2013. I can create the lookup for one of the queries and correlate the matching field values in the second query but trying to do without lookup within. Using Splunk: Splunk Search: join search with condition; Options. But I don't know how to process your command with other filters. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. Your query should work, with some minor tweaks. I know that this is a really poor solution, but I find joins and time related operations quite. e. In second search you might be getting wrong results. search 2 field header is . I am currently using two separate searches and both search queries are working fine when executing separately. index=A product=inA | stats count (UniqueID) as Requests | appendcols [search index=B order="BuyProduct" | stats count (UniqueID) as OrdersPlaced] Check to see whether they have logged on in the last 12 months, In addition add the date on each user row when the account was created/amended. Problem is, searches can be joined only on a field, but I want to pass a condition to it. Bye. left join with field 1 from index2 if field1!=" " otherwise left join with field 2 from index 2. . 20. . 20. This tells Splunk platform to find any event that contains either word. Depending on what your going for you could use appendcols, selfjoin, or join or perform an eval statment combining two searches. | stats values (email) AS email by username. So version 4 of a certain OS has it's own out-of-support date, version 5 another supportdate. The multisearch command is a generating command that runs multiple streaming searches at the same time. Looks like a parsing problem. . See next time. below is my query. . . I am very new to Splunk and basically been dropped in the deep end!! also very new to language so any help and tips on the below would be great. BCC {}; the stats function group all of their values into a multivalue field "values (domain)", grouped by Sender. . Combining Search Terms . index=aws-prd-01 application. ”. Optionally specifies the exact fields to join on.