splunk join two searches. (| table host DisplayName DisplayVersion DesktopGroupName) host = MachineName, that fields contains same values, in same format. splunk join two searches

 
 (| table host DisplayName DisplayVersion DesktopGroupName) host = MachineName, that fields contains same values, in same formatsplunk join two searches <code> Here is an example: First result would return for Phase-I project sub-project processed_timestamp p1 sp11 5/12/13 2:10:45</code>

I am still very new to Splunk, but have learned enough to create reports using the " Extract Fields". COVID-19 Response SplunkBase Developers Documentation. Splunk Platform Products; Splunk Enterprise; Splunk Cloud; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium Solutions; IT Ops Premium Solutions; DevOps Premium Solutions; Apps and Add-ons; All Apps and Add-ons; Discussions. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. If that common field (in terms of matching values) is mail_srv/srv_name, then try like this. A subsearch can be initiated through a search command such as the union command. To learn more about the union command, see How the union command works . |inputlookup COVID-19 Response SplunkBase Developers Documentation BrowseHi, I hope you're at 6. Hi, I know this is a hot topic and there is answers everywhere, but i couldn't figure out by my self. I need to combine both the queries and bring out the common values of the matching field in the result. It is essentially impossible at this point. Try speeding up your regex search right now using these SPL templates, completely free. Hi, We have two kind of logs for our system: First one logs all the user sessions with user name, src ip, dst ip, and login/logout time. Splunk Search cancel. The information in externalId and _id are the same. Needs some updating probably. Browsea splunk join works a lot like a sql join. The events that I posted are all related to var/logs . Step 1: Start by creating a temporary value that applies a zero to every ip address in the data. Splunk query based on the results of another query. Hello, I'm trying to join two searches, and i need to use host in the other one, to be able to table it by DesktopGroupName and installed apps. Splunk Platform Products; Splunk Enterprise; Splunk Cloud; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium Solutions; IT Ops Premium Solutions; DevOps Premium Solutions; Apps and Add-ons; All Apps and Add-ons; Discussions. Description: The traditional join command joins the results from the main results pipeline with the search pipeline results provided as the last argument. Generating commands fetch information from the datasets, without any transformations. Thank you gcusello, First query -- All Good , Second query -- All Good , However in the Third query which is the combination of First and SecondThanks Woodcock, I am not sure from where are you getting the value for Runtime in the above query. pid = R. Index=A sourcetype=accesslogs -->This search has a SignatureProcessId ( which is same as processId in the search1) and also it has userId. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. uniqueId=* (index=index1 OR index=index2) | stats dc (index) AS distinctindexes values (index) values (username) AS username by uniqueId | where distinctindexes>1. I'm using the following searches: Search 1 - "EI Auth" Auth - index="main" auditSource=*auth* auditType=LoginEntitlements detail. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. . Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. Hi @jerrytao, consider your Search1 with table result -> * A | B * and your Search2 with table result -> A | C | D , try this below to join COVID-19 Response SplunkBase Developers Documentation BrowseSo, I figured that if I use eval to rename the field in the first search, it should match the corresponding field in the second search when using a join. So you do not want to "combine" results of the two queries into one, just to apply some additional conditions to the o365 search, conditions used in the mail search that haven't been applied in the o365 search. ip=table2. My goal is to win the karma contest (if it ever starts) and to cross 50K. 344 PM p1. Combining Search Terms . . You can use the union command at the beginning of your search to combine two datasets or later in your search where you can combine the incoming search results with a dataset. Thanks for the help. For flexibility and performance, consider using one of the following commands if you do not require join semantics:. You can use the join command to combine the results of a main search (left-side dataset) with the results of either another dataset or a subsearch (right-side dataset). SSN=*. Then, after the join I do: eval diff_times=time_in-time_reg | search diff_times>=0 AND diff_times<600000. The raw data is a reg file, like this:. log group=per_index_thruput earliest=-4h | stats sum (kb) as kb by series | rename series as index ] | table index sourcetype kb. | join type=left key [base search] I trued and if hard code the 2 searches together with the 2nd search in left join with the base search it work perfectly. . With drill down I pass the 'description' by a token to the search that has to combine the search into a table. 0, the Splunk SOAR team has been hard at work implementing new. You can also combine a search result set to itself using the selfjoin command. 30. You want that the searchA and searchB return a single line per field1, otherwise the join between the 2 lists will be wrong. Notice that I did not ask for this and you did not provide what I did ask for. pid <right-dataset> This joins the source data from the search pipeline with the right-side dataset. (due to a negation and possibly a large list of the negated terms). The Great Resilience Quest: Leaderboard 7. Please see thisI need to access the event generated time which splunk stores in _time field. ravi sankar. yea so when i ran the serach with eventstats no statistics show up in the results. Then I will slow down for a whil. In both inner and left joins, events that. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. I have used append to merge these results but i am not happy with the results. Turn on suggestions. It pulled off a trailing four-quarter earnings surprise of 154. This totally worked for me thanks a ton! For anyone new to this, the fields will look like they've each been merged into a single value in each Parameter, but are still separate values in a way - they're Multivalues now - so to merge 2 multivalues into one, use mkjoin or mkindex (field,0)+mkindex (field,1) 0 Karma. Event 2 is data related to password entered and accepted for the sudo login which has host , user name the. 3. Below is an example of two different searches that I am joining so I can get the following outcome after creating extracted fields1. Security & the Enterprise; DevOps &. Example: | strcat allrequired=f email "|" uname "|" secondaryuname identity. Solved: I have two searches that I want to combine into one: index=calfile CALFileRequest. hai all i am using below search to get enrich a field StatusDescription using. Even search works fine, you will get partial results. The rex command that extracts the duration field is a little off. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. I want to be able to sort the list (A) of files by a user id, and correlate back to a departme. | mvexpand. Syntax: type=inner | outer | left Description: Indicates the type of join to perform. If the data from the left part of the search returns a small number of values that can then be looked up on the right, then a map might be the right answer. ” This tells Splunk platform to find any event that contains either word. First one logs all the user sessions with user name, src ip, dst ip, and login/logout time. I need to combine both the queries and bring out the common values of the matching field in the result. The right-side dataset can be either a saved dataset or a subsearch. . 1) index=symantec_sep sourcetype="symantec:ep:scan:file" | dedup dest |table dest | sort dest. . This search includes a join command. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. . 1. TPID=* CALFileRequest. Generally, after getting data into your Splunk deployment, you want to: Investigate to learn more about the data you just indexed or to find the root cause of an issue. 344 PM p1. 2nd Dataset: with two fields – id,director [here id in this dataset is same as movie_id in 1st dataset] So let’s start. I have set the first search which searches for all user accounts: |rest /services/authentication/users splunk_server=local |fields title |rename title as user. 3:05:00 host=abc status=down. Bye. 17 - 8. [R] r ON q. join does indeed have the ability to match on multiple fields and in either inner or outer modes. I'm trying to join 2 lookup tables. Your query should work, with some minor tweaks. In this case join command only join first 50k results. . See Initiating subsearches with search commands in the Splunk Cloud Platform Search Manual. OK, step back through the search. 6 hours ago. Learn more about Labs. Full of tokens that can be driven from the user dashboard. But, if you cannot work out any other way of beating this, the append search command might work for you. join Multisearch Union OR boolean operator The most common use of the OR operator is to find multiple values in event data, for example, “foo OR bar. The closest discussion that looks like what I am shooting for is: How to join two searches on a common field where the value of the left search matches all values of. g. 1) You can use join with an "outer" search and a subsearch: first_search | join host [ second_search ] 2) But you probably don't have to do them as separate searches. index=sendmail earliest="@d-2h" latest="@d+10h" | append [ search index=sendmail earliest="@d+10h" latest="@d. 1. . Twitter. csv. Let's say my first_search above is "sourcetype=syslog "session. Description. First one logs all the user sessions with user name, src ip, dst ip, and login/logout time. Solution. Now i use the second search as as a COVID-19 Response SplunkBase Developers DocumentationIt's another Splunk Love Special! For a limited time, you can review one of our select Splunk products through Gartner Peer Insights and receive a $25 Visa gift card! Review: SOAR (f. Hi All, I have a scenario to combine the search results from 2 queries. Search 3 will be the adhoc query you run to lookup the data. 73. Subsearches are enclosed in square brackets [] and are always executed first. Change status to statsCode and you should be good to gook . Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. Write a single search to show two records to join; I am assuming you are not masking your intended search and index, and NOT somefield 1 2 is common across both searches: 2. So let’s take a look. Use. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. Click Search: 5. Use the search command to retrieve events from indexes or filter the results of a previous search command in the pipeline. Logline 1 -. SRC IP above comes from a pool, and can be reassigned to another user, if it's not being used by anyone else at the time. For example, I am seeing time mismatches in the _time value between chart columns (some being incorrect). From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Splunk offers two commands — rex and regex — in SPL. I currently try to do a splunk auditing by searching which user logged into the system using some sort of useragent and so on. What you're asking to do is very easy - searching over two sourcetypes to count two fields. Here is an example: First result would return for Phase-I project sub-project processed_timestamp p1 sp11 5/12/13 2:10:45. I can't combine the regex with the main query due to data structure which I have. . d,e,f Solved: I have two searches: search-A gives values like type status hostname id port Size base cache OFF host-1 17 NA NA NA NA ON host-1 6 SplunkBase Developers Documentation Browse Simplicity is derived from reducing the two searches to a single searches. | join type=left key [base search] I trued and if hard code the 2 searches together with the 2nd search in left join with the base search it work perfectly. The first search uses a custom Python script:The exact where expression may need to be tweaked depending on the content of that field and if you're trying an exact match or a CIDR match. I'm able to pull out this infor if I search individually but unable to combine. I dont know if this is causing an issue but there could be4. The following command will join the two searches by these two final fields. SRC IP above comes from a pool, and can be reassigned to another user, if it's not being used by anyone else at the time. 2. My 2nd search gives me the events which will only come in case of Logged in customer. e. index="job_index" middle_name="Foe" | join type=left job_title [search index="job_index" middle_name="Stu"] If there is always one event being used from each dataset then appendcols may perform better. 06-19-2019 08:53 AM. ( verbs like map and some kinds of join go here. How to combine two queries in Splunk?. Turn on suggestions. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. 2. It uses rex to extract fields from the events rather regex , which just filters events. left join with field 1 from index2 if field1!=" " otherwise left join with field 2 from index 2. You will need to replace your index name and srcip with the field-name of your IP value. BrowseI would have a table that join those 2 datas in one table, that is all fields from the second data joined with the fields of the first one. I'm seeking some guidance with optimizing a Splunk search query that involves multiple table searches and joins. Define different settings for the security index. second search. So at the end I filter the results where the two times are within a range of 10 minutes. Having high number of results in first search is perfectly fine, but the problem is with second search which is also called sub search. The right-side dataset can be either a saved dataset or a subsearch. Then you take only the results from both the tables (the first where condition). Turn on suggestions. Splunk Pro Tip: There’s a super simple way to run searches simply. 0. Field 2 is only present in index 2. 30. splunk-enterprise. If the two searches joined with OR add up to 1728, event count is correct. COVID-19 Response SplunkBase Developers Documentation. 06-23-2017 02:27 AM. Same as in Splunk there are two types of joins. The efficiency is better with STATS. join does indeed have the ability to match on multiple fields and in either inner or outer modes. Hey all, this one has be stumped. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Post Reply Related Topics. So you run the first search roughly as is. join command usage. Solution. In the perfect world the top half does'tre-run and the second tstat re-use the 1st half's data from the original run. 06-23-2017 02:27 AM. The following example merges events from incoming search results with an existing dataset. One thing that is missing is an index name in the base search. I've shown you the table above for PII result table. Do you have an example event that sets duration toHi , Thanks for your answer but it returns wrong results. We can join two searches with no command fields by creating a field alias so both the externalid and _id can map per a distinct field. I am writing a splunk query to find out top exceptions that are impacting client. The most common use of the “OR” operator is to find multiple values in event data, e. 1 Answer. The union command appends or merges event from the specified datasets, depending on whether the dataset is streaming or non-streaming and where. Splunk Answers. In o365 search, recipient domain is extracted from three possible fields, ExchangeMetaData. index=_internal earliest=-4h | stats count by index sourcetype | join type=inner index [search index=_internal source=*metrics. . for example, search 1 field header is, a,b,c,d. . The multisearch command is a generating command that runs multiple streaming searches at the same time. 1) You can use join with an "outer" search and a subsearch: first_search | join host [ second_search ] 2) But you probably don't have to do them as separate searches. | join type=left client_ip [search index=xxxx sourcetype. . sourcetype="srcType1" OR sourcetype="srcType2" commonField=* | stats count as eventcount by commonField | search eventcount>1. Step 2: Use the join command to add in the IP addresses from the blacklist, including every IP address that matches. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. | savedsearch "savedsearch1" | eval flag="match" | rename _time as time1 | append maxtime=1800 timeout=1800 [ savedsearch "savedsearch2" | eval flag="metric" | re. It is built of 2 tstat commands doing a join. Hi @jerrytao , The easiest way to do this would be to use a join command: index=cosv2 ul-ctx-source=c4rupgrd source="FunctionHandler@*" Community. 05-02-2016 05:51 AM. search 1 -> index=myIndex sourcetype=st1 field_1=* search 2 -> index=myIndex sourcetype=st2. One of the datasets can be a result set that is then piped into the unioncommand and merged with a. The left-side dataset is the set of results from a search that is piped into the join command. There need to be a common field between those two type of events. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. The three rex commands extract the desired fields then the stats command puts the^ this guy wants to catch up to somesoni so badly :-D. Bye. The search ONLY returns matches on the join when there are identical values for search 1 and search 2. The following example appends the current results of the main search with the tabular results of errors from the. . 03:00 host=abc ticketnum=inc123. The left-side dataset is the set of results from a search that is piped into the join. 2. Below is my code: | set diff [search sourcetype=nessus source=*Host_Enumeration* earliest=-3d@. 1st Dataset: with four fields – movie_id, language, movie_name, country. You're essentially combining the results of two searches on some common field between the two data sets. I have to agree with joelshprentz that your timeranges are somewhat unclear. Table 1 userid, action, IP Table2 sendername, action, client_IP Query : select Table1. index = "windows" sourcetyp. below is my query. Step 3: Filter the search using “where temp_value =0” and filter out all the results of the match between the two. Answers. まずはSplunk中級者?がハマりがちなsubsearchs、join、append、inputlookupの制限をチェック Splunk Version 8. . com/answers/526074/… – Tsakiroglou Fotis Aug 17, 2018 at 16:03 Add a comment 2 Answers Sorted by: 8 Like skoelpin said, I would. | inputlookup Applications. reg file and import to splunk. | from mysecurityview | fields _time, clientip | union customers. For instance: | appendcols [search app="atlas"Splunk Search cancel. sekhar463. Then I try to check if the user displayed has administration rights by appending the subsearch displayed below. CC{}, and ExchangeMetaData. Splunk Administration; Deployment ArchitectureFor example, doing this: | multisearch [search a] [search b earliest=-7d@d latest=-6d@d] with a global timespan of "Today" will not restrict search a to "Today". Splunk: Trying to join two searches so I can create delimters and format as a. If they are in different indexes use index="test" OR index="test2" OR index="test3". Option 1: Use combined search to calculate percent and display results using tokens in two different panels. Monitoring Splunk; Using Splunk; Splunk Search; Reporting; Alerting; Dashboards & Visualizations; Splunk Development; Building for the Splunk Platform; Splunk Platform Products; Splunk Enterprise; Splunk Cloud Platform; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions;Simply find a search string that matches what you’re looking for, copy it, and use right in your own Splunk environment. The command you are looking for is bin. Description: The traditional join command joins the results from the main results pipeline with the search pipeline results provided as the last argument. TransactionIdentifier=* | rename CALFileRequest. When I am passing also the latest in the join then it does not work. It sounds like you're looking for a subsearch. Community Office Hours;. . com pages reviewing the subsearch, append, appendcols, join and selfjoin. Splunk – Environment . Hence not able to make time comparison. I have set the first search which searches for all user accounts: |rest /services/authentication/users splunk_server=local |fields title |rename title as user. The second part of the output table (start1, end1, Acct_Session_Id, NAS_IP_Address, User_Name) returns identical rows, i. CC {}, and ExchangeMetaData. In general is there any way to dynamically manipulate from the main search the time range (earliest latest) that the 2nd search will. For flexibility and performance, consider using one of the following commands if you do not require join semantics: lookup command. 1 Answer. You can use other techniques, such as searching for all the data in a single search and then manipulating it with eval/stats to get to your desired output, but need more info on that. . However, the “OR” operator is also commonly used to combine data from separate sources, e. Depending on what your going for you could use appendcols, selfjoin, or join or perform an eval statment combining two searches. I'm trying to join two searches where the first search includes a single field with multiple values. So you do not want to "combine" results of the two queries into one, just to apply some additional conditions to the o365 search, conditions used in the mail search that haven't been applied in the o365 search. Help needed with inner join with different field name and a filter. I am new to splunk and struggling to join two searches based on conditions . I have then set the second search which. You have _time, client_ip, client_name And I don't know why you'reThanks, I was looking for this oneYes, you have correctly used stats, to join (integrationName="Opsgenie Edge Connector - Splunk" alert. | stats values (email) AS email by username. pid = R. Any idea on how to join these two based on closest time?Er that has a stats command in there, it can't return events unless you're running in verbose mode, in which case just switch to the relevant tabHi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. You must separate the dataset names. 20 t1 user1 30. Try this! search A| fields userid, action, IP| join client_IP as IP [search b | fields sendername, client_IP] OR There is also a way to use STATS. index="job_index" middle_name="Foe" | appendcols. I have then set the second search. After this I need to somehow check if the user and username of the two searches match. Description The multisearch command is a generating command that runs multiple streaming searches at the same time. Subscribe to Support the channel: help? Message me on LinkedIn: efficient way is to do a search looking at both indexes, and look for the events with the same values for uniqueId. etc. I do not know what the protocol part comes from. If you want to coorelate between both indexes, you can use the search below to get you started. Monitoring Splunk; Using Splunk; Splunk Search; Reporting; Alerting; Dashboards & Visualizations; Splunk Development; Building for the Splunk Platform; Splunk Platform Products; Splunk Enterprise; Splunk Cloud Platform; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium. Having high number of results in first search is perfectly fine, but the problem is with second search which is also called sub search. . From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. You need to illustrate your data (anonymize as needed), explain key data characteristics, illustrate the results,. This command requires at least two subsearches and allows only streaming operations in each subsearch. I need a different way to join two searches rodolfotva. I'm new to Splunk and need some help with the following: authIndexValue [] is an array that will hold at least one value. ) THE SEARCH PSEUDOCODE. index=mysearchstring2 [ search index=mysearchstring1 | fields employid | format ] Splunk will run the subsearch first and extract only the employid field. One thing that is missing is an index name in the base search. 20 t0 user2 20. In the lookup there is Gmail, in recipient email, it will shows the results. Your query should work, with some minor tweaks. I have two source types, one (A) has Active Directory information, user id, full name, department. Use Regular Expression with two commands in Splunk. There are often several ways to get the same result in Splunk - some more performant than others - which is useful in large data sets. I suspect that @somesoni2 will slow down once he crosses 100K but I though that he would slow down when he solidly grabbed the #1 slot and he didn't. 51 1 1 3 answers. combine two search in a one table indeed_2000. Splunk Platform Products; Splunk Enterprise; Splunk Cloud; Splunk Data Stream Processor; Splunk Data Fabric Search; Splunk Premium Solutions; Security Premium Solutions; IT Ops Premium Solutions; DevOps Premium Solutions; Apps and Add-ons; All Apps and Add-ons; Discussions. The combined search you just conducted will now appear in the Recent Searches section, which will allow you to combine it with other searches if desired: Facebook. For this reason I was thinking to run the 2nd search with a dynamic field (latest) which will be calculated in the main search and it will search in the DNS only up to the last time this user used this IP address. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. 1. and Field 1 is common in . ip,Table2. INNER JOIN [SE_COMP]. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Step 3: Filter the search using “where temp_value =0” and filter out all the. There need to be a common field between those two type of events. The left-side dataset is sometimes referred to as the source data. Ive tried using a search using an OR statement to try and join the searches that I am getting, but I noticed that the fields I am extracting duplicate information and the tables don't get joined properly. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. ” This tells Splunk platform to. Explorer. The reasons to avoid join are essentially two. 1st Dataset: with four fields – movie_id, language, movie_name, country. Here are examples: file 1:Good, I suggest to modify my search using your rules. Splunk query based on the results of. From PaloAlto logs I get the list of malicious domains detected and blocked with the following query and I do a join statement looking for each malicious domain a DNS request entry in the. Let’s take an example: we have two different datasets. Update inputs. Optionally specifies the exact fields to join on. Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. It comes in most handy when you try to explain to relatively new splunkers why they really shou. message = "STORE*") and (sourcetype="snow:incident" dv_opened_by=OPSGenieIntegration) - all within the second search. If Id field doesn't uniquely identify combination of interesting fields, you. On the other hand, if the right side contains a limited number of categorical variables-- say zip. When I run the first part of the query independently for the last 60 minutes, I receive 13Hi, I am trying to get a list of workstations trying to connect to malicious DNS using PaloAlto and SYSMON logs. . join on 2 fields. The difference between an inner and a left (or outer) join is how the events are treated in the main search that do not match any of the events in the subsearch. Each of these has its own set of _time values. at first you have to check how many results you have in the second query because there's a limit of 50,000 results in subqueries, so maybe this is the problem. Joined both of them using a common field, these are production logs so I am changing names of it. How to add multiple queries in one search in Splunk. csv. Answers. After this I need to somehow check if the user and username of the two searches match. g. The Basics of Regex The Main Rules ^ = match beginning of the line $ = match end of the line. hi let me make it easier for you to understand , | lookup email_domain_whitelist domain AS RecipientDomain output domain as domain_match |. dwaddle. I saw in the doc many ways to do that (Like append. Search 2 (from index search) Month 1 Month 2. splunk. index="job_index" middle_name="Foe" | join type=left job_title [search index="job_index" middle_name="Stu"] If there is always one event being used from each dataset then appendcols may perform better. ip,Table2. 1 KB. Watch now!Since the release of Splunk SOAR 6. , thanks for your quick response! Actually, there are other filter rules in ul-log-data, so I simplified the description in the post. search. Inner Join. You also want to change the original stats output to be closer to the illustrated mail se. Turn on suggestions. Descriptions for the join-options.