<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I need to display all the values in the below search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375362#M160435</link>
    <description>&lt;P&gt;Then move the line &lt;CODE&gt;| dedup source&lt;/CODE&gt; to be inside the &lt;CODE&gt;map&lt;/CODE&gt; search, because after the map, that is getting rid of all the results except a single result event from each source, regardless of how many times the &lt;CODE&gt;map&lt;/CODE&gt; was run.&lt;/P&gt;

&lt;P&gt;Your mapped &lt;CODE&gt;search&lt;/CODE&gt; should look like this - &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[search index="inedx2" $NAME$ | dedup source | table source |eval NAME="$NAME$"|eval OBJECT_TYPE="$OBJECT_TYPE$"|eval PROJECTNAME="$PROJECTNAME$" ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Be sure to get rid of the &lt;CODE&gt;dedup&lt;/CODE&gt; that is after the &lt;CODE&gt;map&lt;/CODE&gt;.&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jul 2017 22:54:21 GMT</pubDate>
    <dc:creator>DalJeanis</dc:creator>
    <dc:date>2017-07-02T22:54:21Z</dc:date>
    <item>
      <title>I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375360#M160433</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;index="index1" PROJECTNAME="*" ( OBJECT_TYPE="*" OR OBJECT_TYPE="*" )  | dedup PROJECTNAME OBJECT_TYPE NAME |map [search index="inedx2" $NAME$ |eval NAME="$NAME$"|eval OBJECT_TYPE="$OBJECT_TYPE$"|eval PROJECTNAME="$PROJECTNAME$" ]| dedup source | table PROJECTNAME OBJECT_TYPE NAME  source
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 02 Jul 2017 09:03:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375360#M160433</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-02T09:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375361#M160434</link>
      <description>&lt;P&gt;What doesn't it show that you think it should?  What types of values are there?  Can you provide data?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2017 12:27:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375361#M160434</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-02T12:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375362#M160435</link>
      <description>&lt;P&gt;Then move the line &lt;CODE&gt;| dedup source&lt;/CODE&gt; to be inside the &lt;CODE&gt;map&lt;/CODE&gt; search, because after the map, that is getting rid of all the results except a single result event from each source, regardless of how many times the &lt;CODE&gt;map&lt;/CODE&gt; was run.&lt;/P&gt;

&lt;P&gt;Your mapped &lt;CODE&gt;search&lt;/CODE&gt; should look like this - &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[search index="inedx2" $NAME$ | dedup source | table source |eval NAME="$NAME$"|eval OBJECT_TYPE="$OBJECT_TYPE$"|eval PROJECTNAME="$PROJECTNAME$" ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Be sure to get rid of the &lt;CODE&gt;dedup&lt;/CODE&gt; that is after the &lt;CODE&gt;map&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2017 22:54:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375362#M160435</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-07-02T22:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375363#M160436</link>
      <description>&lt;P&gt;I want to display the fields PROJECTNAME OBJECT_TYPE NAME  source where source is from index2 and the other three is from index1&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 01:07:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375363#M160436</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-03T01:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375364#M160437</link>
      <description>&lt;P&gt;index1 --&amp;gt; contains the records and fields it's fetched from db&lt;BR /&gt;
index2 contains the source code files&lt;BR /&gt;
I want to find which fields are present in which source file and print them like&lt;BR /&gt;
Source Name(object) Object type and Project&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 01:45:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375364#M160437</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-03T01:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375365#M160438</link>
      <description>&lt;P&gt;From your comments above I think I get what you are asking.  It would be great to have actual data to look at, but hopefully we can guess our way through this just knowing the little we know.&lt;/P&gt;

&lt;P&gt;You seem to be connecting things together in a harder way than is usually necessary, so let's see if we can figure out a simpler method - even if not perfect.  If we can get close with a simpler search, maybe it'll be easier to get it just right.&lt;/P&gt;

&lt;P&gt;When you have data that matches up on several fields, the usual Splunk way to do this is to load all the data up at once, then use stats or transaction to group them on the common fields.  You seem to have a lot of fields that DO match up, so for your search, try:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(index=index1 OR index=index2) PROJECTNAME="*" OBJECT_TYPE="*" | stats list(NAME) BY PROJECTNAME, OBJECT_TYPE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That will frab all the items in &lt;CODE&gt;index1&lt;/CODE&gt; or in &lt;CODE&gt;index2&lt;/CODE&gt; where the &lt;CODE&gt;PROJECTNAME&lt;/CODE&gt; and &lt;CODE&gt;OBJECT_TYPE&lt;/CODE&gt; are set, right?  Then we use &lt;CODE&gt;stats&lt;/CODE&gt; to list the one that's not in common (NAME) connecting together by projectname and object_type.&lt;/P&gt;

&lt;P&gt;If you need to &lt;CODE&gt;... | dedup&lt;/CODE&gt; after that, feel free, but try it without first.  You might also have to be careful with time frames.  Hopefully this gets you something we can work with.  &lt;/P&gt;

&lt;P&gt;If you can, and if you need more help, please - it would be &lt;STRONG&gt;very&lt;/STRONG&gt; beneficial to include a sample of the actual data you are starting with - preferably one from each index that should connect together.  (Use the code 101010 button when you paste!)  Then follow that up with a mock-up of just what you'd like to see out of those two when they're put together.  Showing clearly what you are starting with and what you'd like to see can often be far more helpful than showing the search you have figured out so far (though it all helps!)&lt;/P&gt;

&lt;P&gt;Happy Splunking,&lt;BR /&gt;
Rich&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 02:16:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375365#M160438</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-03T02:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375366#M160439</link>
      <description>&lt;P&gt;Below is how data is. I need to pass the name as parameter to search in index2 (index="index2" name) and print the results as shown in below.&lt;BR /&gt;
index1:&lt;BR /&gt;
Projectname=Test&lt;BR /&gt;
object_type=field&lt;BR /&gt;
name=field&lt;BR /&gt;
Projectname=Test&lt;BR /&gt;
object_type=record&lt;BR /&gt;
name=record&lt;/P&gt;

&lt;P&gt;index2:&lt;BR /&gt;
select field from record(test.sql Source)&lt;/P&gt;

&lt;P&gt;expected result:&lt;BR /&gt;
Projectname object_type  name    source&lt;BR /&gt;
Test        record       record   test.sql&lt;BR /&gt;
Test        field        field    test.sql&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:42:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375366#M160439</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2020-09-29T14:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375367#M160440</link>
      <description>&lt;P&gt;You still seem to miss the field for correcting data in the two indices. Based on the description index2 should have field called "name" with value= "field". If not please add. Also what is the source of index1?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 02:36:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375367#M160440</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-07-03T02:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375368#M160441</link>
      <description>&lt;P&gt;source of index1 is db. No index 2 there is no filed called name.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 02:44:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375368#M160441</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-03T02:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375369#M160442</link>
      <description>&lt;P&gt;If none of the field names are same atleast are there field values which can be used for correlation?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 04:05:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375369#M160442</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-07-03T04:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375370#M160443</link>
      <description>&lt;P&gt;we can corelate the both with NAME field.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 04:09:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375370#M160443</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-03T04:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375371#M160444</link>
      <description>&lt;P&gt;Please do us a favor and provide samples of EACH of the two types of events?  The ACTUAL data?  Pretty pretty please?  With all the fields intact?  Preferable on a pair of events - one from each index - that would actually match up? &lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 12:38:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375371#M160444</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-03T12:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375372#M160445</link>
      <description>&lt;P&gt;Your obfuscation/generalization is too much - too many "field" "field" "field" values makes it very difficult to see what's going on.  We work with data all the time, we can figure out the important bits if given a chance, so can you please post in some actual events?  (If you have to obscure some IP addresses or names, fine, but try to keep the structure the same, and try to keep unique fields unique, not "field" but maybe "MyServerName1")&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Rich&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 12:45:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375372#M160445</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-03T12:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375373#M160446</link>
      <description>&lt;P&gt;Let's take a step back.&lt;/P&gt;

&lt;P&gt;You seem to have two sets of data.  One of which is (or was) in a database, and another which is in Splunk.  You are trying to match certain values across these two sets of data and want to output the intersection of them.&lt;/P&gt;

&lt;P&gt;There are three general ways to go about this.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaseoutputs"&gt;Create and use a DB Output&lt;/A&gt;, &lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaselookups"&gt;Create and use a DB Lookup&lt;/A&gt;, or &lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaselookups#Select_between_database_lookups_and_Splunk_lookups"&gt;Create a "regular" lookup from a DB&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;The difference between them are large.  Let's take them in order so you can decide which may fit your needs best.&lt;/P&gt;

&lt;P&gt;A DB Output takes database material - literal rows of a database - and outputs them to Splunk.  So your &lt;EM&gt;source&lt;/EM&gt; of the data is a SQL Query, like &lt;CODE&gt;select name, location, address from tablename&lt;/CODE&gt;.  The destination of your data is a Splunk index.  So, after you run this your data is in Splunk, just like regular data, and you can search on it just as if it's in Splunk normally, because it is in Splunk "normally".  In that case, elsewhere in here is an answer showing a way to use stats to connect these together.  The docs for &lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaseoutputs"&gt;Creating a DB Output&lt;/A&gt; cover this thoroughly, but if you decide this is the route you want to go and get stuck, please ask questions!&lt;/P&gt;

&lt;P&gt;A DB Lookup leaves the data in the DB and lets you do more or less a "regular lookup" only directly into the DB.  In this case, there's no index at all on the Splunk side - each time you need to connect a result you literally ask the DB &lt;EM&gt;again&lt;/EM&gt; for the information.  Now, if you keep in mind that most DBs are fairly quick you may realize this works quite well most of the time.  The docs for &lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaselookups#Create_a_database_lookup"&gt;Creating a DB Lookup&lt;/A&gt; step you through the entire process and show examples of use at the end.  Again if you go this route and get stuck, ask questions!&lt;/P&gt;

&lt;P&gt;Lastly, there is the ability to create a "regular" lookup using data from a DB.  This is a hybrid. In it, you create a regular CSV or KVstore based lookup, then use &lt;CODE&gt;dbxquery&lt;/CODE&gt;, and either/or/both of &lt;CODE&gt;inputlookup&lt;/CODE&gt; and &lt;CODE&gt;outputlookup&lt;/CODE&gt; to update that lookup.  There is a short blurb on them &lt;A href="http://docs.splunk.com/Documentation/DBX/3.0.3/DeployDBX/Createandmanagedatabaselookups#Select_between_database_lookups_and_Splunk_lookups"&gt;here in the docs&lt;/A&gt;.  I think that section is short because it's simple and all the real work to do this is in the &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Knowledge/Addfieldsfromexternaldatasources"&gt;Lookup documentation&lt;/A&gt;. &lt;/P&gt;

&lt;P&gt;Can you please read through those docs and see if any of them fit the bill for what you are trying to do?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 13:15:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375373#M160446</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-03T13:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375374#M160447</link>
      <description>&lt;P&gt;Index1 sample event:&lt;BR /&gt;
2017-06-28 11:43:15.688, PROJECTNAME="Test", OBJECTTYPE="2", OBJECT_TYPE="Field", NAME="B_CLAIM_STATUS_CD", EXTENDED_OBJ_NAME=" ", DESCR=" "&lt;/P&gt;

&lt;P&gt;Index2 sample event:&lt;BR /&gt;
! mliu should not pass the b_claim_status_cd condition to the following sub query&lt;/P&gt;

&lt;P&gt;I'm passing the NAME as search parameter in the index2 it'll return the events wherever the string is there from there I can display the source name. But apart from that I need to display the passed NAME variable in order to show that this string is present in this source file is it possible.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:42:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375374#M160447</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2020-09-29T14:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375375#M160448</link>
      <description>&lt;P&gt;OK, we're getting somewhere.&lt;/P&gt;

&lt;P&gt;Does index2 contain free form events - ones with no structure, or at least undetermined structure?  Or does it have at least some structure ,even if of a handful of different types?&lt;/P&gt;

&lt;P&gt;I think all good solutions are going to require applying a structure for it.  We can help with that (probably easily) but you'll have to decide if you have enough structure, or if you can change the structure (intrinsic) of that data.&lt;/P&gt;

&lt;P&gt;How many results to do you get if you run &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fw 
| stats count by punct 
| stats count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What is the final count?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2017 20:41:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375375#M160448</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-04T20:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375376#M160449</link>
      <description>&lt;P&gt;Index1 sample event:&lt;BR /&gt;
2017-06-28 11:43:15.688, PROJECTNAME="Test", OBJECTTYPE="2", OBJECT_TYPE="Field", NAME="B_CLAIM_STATUS_CD", EXTENDED_OBJ_NAME=" ", DESCR=" "&lt;/P&gt;

&lt;P&gt;Index2 sample event:&lt;BR /&gt;
! mliu should not pass the b_claim_status_cd condition to the following sub query&lt;/P&gt;

&lt;P&gt;I'm passing the NAME as search parameter in the index2 it'll return the events wherever the string is there from there I can display the source name. But apart from that I need to display the passed NAME variable in order to show that this string is present in this source file is it possible.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:45:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375376#M160449</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2020-09-29T14:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375377#M160450</link>
      <description>&lt;P&gt;I've done some more digging around, and I don't think there's any supported way to do this in a generalized manner GIVEN the apparent fact you have no extracted fields on the index2 side of things, and that side is the "outer" side of the "join" (I hate to use those words because this is Splunk and not SQL, but they're the right words in this particular case).&lt;/P&gt;

&lt;P&gt;If you can create fields out of index2, or at least create the &lt;EM&gt;one&lt;/EM&gt; field you need, then this is not hard at all.  It's simply the fact that it's a freeform, "search all text" problem on that side that causes the problem, and that it's the side that isn't always there.&lt;/P&gt;

&lt;P&gt;So, my opinion is to create a field out of that side.  You might have to use 35 separate EXTRACT-blah lines in your props.conf, but this is the only way I can find to do it correctly and properly (or even so that it'll actually work).  For instance...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;! mliu should not pass the b_claim_status_cd condition to the following sub query
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;could be&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  EXTRACT-passed-invalid-condition = (?&amp;lt;error_caller&amp;gt;\w+) should not pass the( ?&amp;lt;error_condition&amp;gt;\w+) condition to the following sub query
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;After which you'll have a field called &lt;CODE&gt;error_caller&lt;/CODE&gt; which is equal to &lt;CODE&gt;mliu&lt;/CODE&gt; and &lt;CODE&gt;error_condition&lt;/CODE&gt; equal to &lt;CODE&gt;b_claim_status_cd&lt;/CODE&gt;.  Your needs WILL vary, and will be different from the stuff I just wrote, but what I wrote may be a start.  And again you might have to do that several times - one for each "style" of event.  (Actually, I'd replace every single whitespace after the &lt;CODE&gt;=&lt;/CODE&gt; with &lt;CODE&gt;\s+&lt;/CODE&gt;, too, but I left it this way for readability and it should work like this).  You may find you have fewer patterns than you thought and you can generalize the extractions and only make a few.  I don't know, I have seen a total of one single event from that side.&lt;/P&gt;

&lt;P&gt;Once you are done, you can easily subsearch (with some renaming/formatting) one into the other, transaction them, stats group them, or even join or whatever.  Even if you just get one or two extracted, you can probably test with that (or ask again) and get something working.&lt;/P&gt;

&lt;P&gt;(BTW, I did come up with a completely hacky solution involving makemv and mvexpand on _raw, but it's TERRIBLY slow and awful.  As in "many minutes to run" on a few hundred items, and creating 100's of KB of normalized search.  As in, more importantly, not something I'd share here or anywhere because it's too terrible.  Plus I actually don't think even IT will work, it'll still not return all the things on both sides - I had figured I'd tackle that after at least I got it &lt;EM&gt;searching&lt;/EM&gt; the other side, which I did and realized the futility.)&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 23:32:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375377#M160450</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-07T23:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375378#M160451</link>
      <description>&lt;P&gt;tvon1990,&lt;/P&gt;

&lt;P&gt;Also, on this last one - try a search on "index=Index2" over a reasonable time period then switch to the "patterns" tab to help you figure out how many props entries you may need.&lt;/P&gt;

&lt;P&gt;Beyond that, did one of the four answers provide what you need?  Do you need some help implementing any of the potential solutions mentioned?&lt;/P&gt;

&lt;P&gt;Happy Splunking,&lt;BR /&gt;
Richfez&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2017 14:58:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375378#M160451</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-07-16T14:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: I need to display all the values in the below search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375379#M160452</link>
      <description>&lt;P&gt;Hi ,&lt;BR /&gt;
No it didn't provide the answer I needed. however i tried and sovled it.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="index1" PROJECTNAME="*" ( OBJECT_TYPE="**" OR OBJECT_TYPE="*Field*" ) | stats count by PROJECTNAME OBJECT_TYPE NAME | map  [ search index="index2" sourcetype="sqr*" $NAME$ | eval NAME = "$NAME$" | eval OBJECT_TYPE="$OBJECT_TYPE$" | eval PROJECTNAME="$PROJECTNAME$"| dedup NAME source | table source NAME OBJECT_TYPE PROJECTNAME] maxsearches=1000| sort by source
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 20 Jul 2017 13:51:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/I-need-to-display-all-the-values-in-the-below-search/m-p/375379#M160452</guid>
      <dc:creator>tvon1990</dc:creator>
      <dc:date>2017-07-20T13:51:45Z</dc:date>
    </item>
  </channel>
</rss>

