Skip to main content
 
 
 
Splunk Lantern

Combining multiple data sources in SPL

 

Depending on your use case or what you are looking to achieve with your Search Processing Language (SPL), you may need to query multiple data sources and merge the results.

The most intuitive command to use when these situations arise is the join command, but it tends to consume a lot of resources - especially when joining large datasets. This article describes the following additional commands and functions that can be applied when combining data from multiple sources, including their benefits and limitations.

OR boolean operator

The most common use of the OR operator is to find multiple values in event data, for example, foo OR bar. This tells Splunk platform to find any event that contains either word. However, the OR operator is also commonly used to combine data from separate sources, for example (sourcetype=foo OR sourcetype=bar OR sourcetype=xyz).

Additional filtering can also be added to each data source, for example, (index=ABC loc=Ohio) OR (index=XYZ loc=California). When used in this manner, Splunk platform runs a single search, looking for any events that match any of the specified criteria in the searches. The required events are identified earlier in the search before calculations and manipulations are applied.

Learn more about using the OR operator in Splunk Docs for Splunk Enterprise or Splunk Cloud Platform.

Syntax for the OR operator

(<search1>) OR (<search2>) OR (<search3>)

Pros

  • Merges fields and event data from multiple data sources
  • Saves time since it does only a single search for events that match specified criteria and returns only the applicable events before any other manipulations

Cons

  • Only used with base searches
  • Does not allow calculations or manipulations per source, so any further calculations or manipulations need to be performed on all returned events

In the example below, the OR operator is used to combine fields from two different indexes and grouped by customer_id, which is common to both data sources.

2023-04-07_10-30-56.png

Append command

Append is a streaming command used to add the results of a secondary search to the results of the primary search. The results from the append command are usually appended to the bottom of the results from the primary search. After the append, you can use the table command to display the results as needed.

The secondary search must begin with a generating command. Append searches are not processed like subsearches where the subsearch is processed first. Instead, they are run at the point they are encountered in the SPL.

Learn more about using the append command in Splunk Docs for Splunk Enterprise or Splunk Cloud Platform.

Syntax for the append command

<primary search> ... | append [<secondary search>]

Pros

  • Displays fields from multiple data sources

Cons

  • Subject to a maximum result rows limit of 50,000 by default
  • The secondary search must begin with a generating command
  • It can only run over historical data, not real-time data

In the example below, the count of web activities on the Splunk user interface is displayed from _internal index along with count per response from the _audit index.

The last four rows are the results of the appended search. Both result sets share the count field. You can see that the append command tacks on the results of the subsearch to the end of the previous search, even though the results share the same field values.

2023-04-07_10-31-16.png

Multisearch command

Multisearch is a generating command that runs multiple streaming searches at the same time. It requires at least two searches and should only contain purely streaming operations such as eval, fields, or rex within each search.

One major benefit of the multisearch command is that it runs multiple searches simultaneously rather than sequentially as with the append command. This could save you some runtime especially when running more complex searches that include multiple calculations and/or inline extractions per data source. Results from the multisearch command are interleaved, not added to the end of the results as with the append command.

Learn more about using the multisearch command in Splunk Docs for Splunk Enterprise or Splunk Cloud Platform.

Syntax for the multisearch command

| multisearch [<search1>] [<search2>] [<search3>] ...

Since multisearch is a generating command, it must be the first command in your SPL. It is important to note that the searches specified in square brackets above are not actual subsearches. They are full searches that produce separate sets of data that will be merged to get the expected results. A subsearch is a search within a primary or outer search. When a search contains a subsearch, the Splunk platform processes the subsearch first as a distinct search job and then runs the primary search.

Pros

  • Merges data from multiple data sources
  • Runs searches simultaneously, thereby saving runtime with complex searches
  • There is no limit to the number of result rows it can produce
  • Results from the multisearch command are interleaved, allowing for a more organized view

Cons

  • Requires that the searches are entirely distributable or streamable
  • Can be resource-intensive due to multiple searches running concurrently. This needs to be taken into consideration since it can cause search heads to crash

In the example shown below, the multisearch command is used to combine the action field from the web_logs index and queue field from the tutorial_games index using the eval command to view the sequence of events and identify any roadblocks in customer purchases. The results are interleaved using the _time field.

2023-04-07_10-31-39.png

Union command

Union is a generating command that is used to combine results from two or more datasets into one large dataset. The behavior of the union command depends on whether the dataset is a streaming or non-streaming dataset. Centralized streaming or non-streaming datasets are processed the same as append command while distributable streaming datasets are processed the same as multisearch command.

Learn more about using the union command in Splunk Docs for Splunk Enterprise or Splunk Cloud Platform.

Syntax for union command

| union [<search2>] [<search2>] … OR … | union [<search>]

However, with streaming datasets, instead of this syntax:
<streaming_dataset1> | union <streaming_dataset2>

Your search is more efficient with this syntax:
... | union <streaming_dataset1>, <streaming_dataset2>

Pros

  • Merges data from multiple data sources
  • Can process both streaming and non-streaming commands, though behavior will depend on the command type
  • As an added benefit of the max out argument, which specifies the maximum number of results to return from the subsearch. The default is 50,000 results. This value is the maxresultrows setting in the [searchresults] stanza in the limits.conf file.

The example below is similar to the multisearch example provided above and the results are the same. Both searches are distributable streaming, so they are “unioned” by using the same processing as the multisearch command.

2023-04-07_10-31-59.png

In the example below, because the head command is a centralized streaming command rather than a distributable streaming command, any subsearches that follow the head command are processed using the append command. In other words, when a command forces the processing to the search head, all subsequent commands must also be processed on the search head.

2023-04-07_10-32-19.png

Comparing OR, Append, Multisearch, and Union

The table below shows a comparison of the four methods:

OR Append Multisearch Union
Boolean Operator Streaming command Generating command Generating command
Used in between searches Used in between searches Must be the first command in your SPL Can be either the first command or used in between searches. Choose the most efficient method based on the command types needed
Results are interleaved Results are added to the bottom of the table Results are interleaved Results are interleaved based on the time field
No limit to the number of rows that can be produced Subject to a maximum of 50,000 result rows by default No limit to the number of rows that can be produced Default of 50,000 result rows with non-streaming searches. Can be changed using maxout argument.
Requires at least two base searches Requires a primary search and a secondary one Requires at least two searches Requires at least two searches that will be “unioned”
Does not allow use of operators within the base searches Allows both streaming and non-streaming operators Allows only streaming operators Allows both streaming and non-streaming operators
Does only a single search for events that match specified criteria Appends results of the subsearch to the results of the primary search Runs searches simultaneously Behaves like multisearch with streaming searches and like append with non-streaming

Next steps

Want to learn more about combining data sources in Splunk? Contact us today! TekStream accelerates clients’ digital transformation by navigating complex technology environments with a combination of technical expertise and staffing solutions. We guide clients’ decisions, quickly implement the right technologies with the right people, and keep them running for sustainable growth. Our battle-tested processes and methodology help companies with legacy systems get to the cloud faster, so they can be agile, reduce costs, and improve operational efficiencies. And with hundreds of deployments under our belt, we can guarantee on-time and on-budget project delivery. That’s why 97% of clients are repeat customers.

The user- and community-generated information, content, data, text, graphics, images, videos, documents and other materials made available on Splunk Lantern is Community Content as provided in the terms and conditions of the Splunk Website Terms of Use, and it should not be implied that Splunk warrants, recommends, endorses or approves of any of the Community Content, nor is Splunk responsible for the availability or accuracy of such. Splunk specifically disclaims any liability and any actions resulting from your use of any information provided on Splunk Lantern.