<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UNION just like SQL.... in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752319#M242634</link>
    <description>&lt;P&gt;The general base search should simply contains the common set of conditions&lt;/P&gt;&lt;PRE&gt;index=AWS_Index_For_App1 sourcetype=AWS_Logs&amp;nbsp;source=AWS_Logs_App1&lt;/PRE&gt;&lt;P&gt;as well as OR-ed specific conditions for each of those "compound searches"&lt;/P&gt;&lt;PRE&gt;(host="sub-service*" "AWS" "httpStatusCode":"409") OR (host="stat-service*" "errorCode: 4091" OR "errorCode: 40914" OR "errorCode: 40922")&lt;/PRE&gt;&lt;P&gt;You could filter out later but it's better to have it early so Splunk can filter out any unneeded events as soon as possible.&lt;/P&gt;&lt;P&gt;If you don't already have your fields extracted (you use spath so your event must be a well-formed JSON structure), you can use spath and have all the fields now&lt;/P&gt;&lt;PRE&gt;| spath&lt;/PRE&gt;&lt;P&gt;Don't&amp;nbsp;&lt;EM&gt;rex&lt;/EM&gt; the raw data now because there's no point. You have your fields. You might need to do some renaming or extracting some parts of their contents but the bulk of your results you already have.&lt;/P&gt;&lt;P&gt;If you want to manipulate only some events, use the&amp;nbsp;&lt;EM&gt;if()&lt;/EM&gt; function in your eval statement (possibly with&amp;nbsp;&lt;EM&gt;searchmatch()&lt;/EM&gt; condition).&lt;/P&gt;&lt;P&gt;And that's it.&lt;/P&gt;&lt;P&gt;Don't overthink it.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Aug 2025 16:21:22 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2025-08-27T16:21:22Z</dc:date>
    <item>
      <title>UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752225#M242595</link>
      <description>&lt;P&gt;Hi, I think i am in the right way to use the union concept in splunk search query but wanted to confirm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 6 different queries using the same index but different search conditions on few fields and finally a table with the same set of columns in all 6 search queries.&lt;/P&gt;&lt;P&gt;I did something like below and&lt;/P&gt;&lt;P&gt;Index=Index123,&lt;BR /&gt;some other search criteria&lt;/P&gt;&lt;P&gt;|table Field1, Field2, Field3, Field4, Field5&lt;/P&gt;&lt;P&gt;| append&amp;nbsp;&lt;/P&gt;&lt;P&gt;[search Index=Index123&lt;/P&gt;&lt;P&gt;some other search criteria&lt;/P&gt;&lt;P&gt;|table Field1, Field2, Field3, Field4, Field5]&lt;/P&gt;&lt;P&gt;samething for the other queries - i just want to get the results from each query and look at all together&lt;BR /&gt;there is nothing like UNION right? just wanted to confirm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 14:36:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752225#M242595</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-26T14:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752226#M242596</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273058"&gt;@Raj_Splunk_Ing&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would suggest trying to include in a single search, will be much more efficient. You can do something like&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=yourIndex (searchCriteria1=here) OR (searchCriteria2=here) | table Field1 Field2 etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt; &lt;STRONG&gt;Did this answer help you? If so, please consider&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 14:40:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752226#M242596</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-26T14:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752235#M242599</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;is correct that it is more efficient to use multiple search criteria on the initial search, but it is not quite the same as a union / append because the method outlined will return an event only once even if it satisfies multiple criteria whereas the append could have multiple instances of events which satisfy multiple criteria. You need to bear this in mind depending on what you are going to be doing with the events you have retrieved.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 15:04:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752235#M242599</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-08-26T15:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752237#M242601</link>
      <description>&lt;P&gt;Thank you &lt;STRONG&gt;ITWhisperer&lt;BR /&gt;since&amp;nbsp;&lt;/STRONG&gt;i have different search criteria in each search query which are going against the same Index&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to look at all the events in each scenario - if 1 event is in query 1 results and the same event is in query2 results it is fine since the criteria for query1 and query2 are different.. so having it in 2 different places is ok&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think i have to go with UNIOn or append in this case? correct&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 15:43:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752237#M242601</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-26T15:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752261#M242611</link>
      <description>&lt;P&gt;I agree with &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;and &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;: you do NOT go with union. &amp;nbsp;Especially because you haven't shown anything in your use case that cannot be achieved using what&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;suggests. &amp;nbsp;It takes some practice to stay away from SQL-like constructs but you will reap the benefit along the way.&lt;/P&gt;&lt;P&gt;Collect some data from your various criteria (can be mock data), and illustrate the result you want from these data. &amp;nbsp;People here will for sure show you a much more efficient search without reaching for union.&lt;/P&gt;&lt;P&gt;SPL does have a &lt;A href="https://help.splunk.com/en/splunk-enterprise/search/spl-search-reference/latest/search-commands/union" target="_blank" rel="noopener"&gt;union&lt;/A&gt;&amp;nbsp;command. &amp;nbsp;But unless there is no alternative, just don't touch it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 02:03:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752261#M242611</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-08-27T02:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752267#M242614</link>
      <description>&lt;P&gt;It depends what you mean by "look at" - the events for each scenario will be returned using the method outlined by&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;- what you then want to do with them will depend on whether you want duplicated events, and even then, you may be able to take that into account from the single list of events. If you could explain what you are trying to do in a bit more detail, we might be able to offer further&amp;nbsp; advice. For now, the advice is to stay away from union / append and use the method outlined, (until you can show some compelling reason to make your search less efficient!).&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 05:57:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752267#M242614</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-08-27T05:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752303#M242620</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;when i search using 2 different individual search queries - i get the data from query1 say 100 rows in statistics&lt;/P&gt;&lt;P&gt;and when i run the query2 say i get 50 records or rows in the statistics tab - each result set includes the data based on the search criteria. the query2 result might include an event that is in the query1 result but the search criteria is different for this. What this means is for us is it is ok to have the 2 duplicates when i combine both of them&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 14:45:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752303#M242620</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T14:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752304#M242621</link>
      <description>&lt;P&gt;The other thing to bear in mind is that subsearches (as used by the append command) have limitations which are avoided by retrieving all the events in a single search. If your searches are small, this may not be a concern, but if your data sets get larger you may get inconsistent results.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 14:54:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752304#M242621</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-08-27T14:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752310#M242627</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I dont have the data but i can give an idea about the 2 diff search queries that&amp;nbsp; i have&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;index=AWS_Index_For_App1&lt;BR /&gt;sourcetype=AWS_Logs&lt;BR /&gt;source=AWS_Logs_App1&lt;BR /&gt;host="sub-service*" "AWS" "httpStatusCode":"409"&lt;BR /&gt;|rex field=_raw "\"httpStatusCode\":\"(?&amp;lt;httpStatusCode&amp;gt;\d+)\",.*?\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;\d+)\",.*?\"errorDescription\":\"(?&amp;lt;errorDescription&amp;gt;[^\"]+)\""&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)" | rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;BR /&gt;|eval ServiceType="Subscriptions"&lt;BR /&gt;|eval Date_Only=strftime(_time, "%Y-%m-%d")&lt;BR /&gt;|table _time httpStatusCode errorCode errorDescription service path _raw ServiceType Date_Only&lt;BR /&gt;|append [search&lt;BR /&gt;index=AWS_Index_For_App1&lt;BR /&gt;sourcetype=AWS_Logs&lt;BR /&gt;source=AWS_Logs_App1&lt;BR /&gt;host="stat-service*" "errorCode: 4091" OR "errorCode: 40914" OR "errorCode: 40922"&lt;BR /&gt;|spath input=_raw&lt;BR /&gt;|rex field=_raw "errorCode:\s*(?&amp;lt;errorCode&amp;gt;\d+)"&lt;BR /&gt;|rex field=_raw "errorDescription:\s*(?&amp;lt;errorDescription&amp;gt;[^}]+)"&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)"&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;BR /&gt;|eval ServiceType="Statements"&lt;BR /&gt;|eval Date_Only=strftime(_time, "%Y-%m-%d")&lt;BR /&gt;|table _time httpStatusCode errorCode errorDescription service path _raw ServiceType,Date_Only]&lt;/P&gt;&lt;P&gt;please suggest if it is useful... i cannot provide the data for sec reasons&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 15:21:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752310#M242627</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T15:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752313#M242630</link>
      <description>&lt;P&gt;It most probably will _not_ work as you wish. While append is sometimes useful, the use cases for it are limited for several reasons, mostly because it's limited by the subsearch limits. A subsearch cannot run for more than 30 seconds by default and return more than 10k results. What's more important - if a search exceeds those limits it will get silently finalized without generating an error so you might never know you got wrong/incomplete results.&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/33901"&gt;@yuanliu&lt;/a&gt;&amp;nbsp;said - it's not SQL and do not think in SQL terms about searching in Splunk. It requires some time to get used to SPL and some of its quirks but it pays off.&lt;/P&gt;&lt;P&gt;BTW, for your search it makes completely no sense to use append.&lt;/P&gt;&lt;P&gt;You're searching from the same set of data. You should definitely get a common base search and differentiate - if needed - further processing based on specific types of events.&lt;/P&gt;&lt;P&gt;You also seem to have had completely no data onboarding if you need to extract your fields manually this way. Not to mention that after you've already done&amp;nbsp;&lt;EM&gt;spath&lt;/EM&gt; (in the appended subsearch), there's no point of trying to extract data manually with regexes. Don't use regexes on structured data. It won't end well.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 15:53:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752313#M242630</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-27T15:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752315#M242632</link>
      <description>&lt;P&gt;Hi Rick, Thanks a lot.&lt;/P&gt;&lt;P&gt;I got these queries from some other team. If I have to rewrite these 2 queries without APPEND what would it look like. Could you please help for these 2 queries that i posted.. using the OR condition&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 16:04:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752315#M242632</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T16:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752317#M242633</link>
      <description>&lt;P&gt;In my case data returned is around 10,000 to 15,000 records not more than that.. I can clearly see the number of records from each are exactly matching with the append.. you think still go with OR condition in 1 single search&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 16:12:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752317#M242633</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T16:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752319#M242634</link>
      <description>&lt;P&gt;The general base search should simply contains the common set of conditions&lt;/P&gt;&lt;PRE&gt;index=AWS_Index_For_App1 sourcetype=AWS_Logs&amp;nbsp;source=AWS_Logs_App1&lt;/PRE&gt;&lt;P&gt;as well as OR-ed specific conditions for each of those "compound searches"&lt;/P&gt;&lt;PRE&gt;(host="sub-service*" "AWS" "httpStatusCode":"409") OR (host="stat-service*" "errorCode: 4091" OR "errorCode: 40914" OR "errorCode: 40922")&lt;/PRE&gt;&lt;P&gt;You could filter out later but it's better to have it early so Splunk can filter out any unneeded events as soon as possible.&lt;/P&gt;&lt;P&gt;If you don't already have your fields extracted (you use spath so your event must be a well-formed JSON structure), you can use spath and have all the fields now&lt;/P&gt;&lt;PRE&gt;| spath&lt;/PRE&gt;&lt;P&gt;Don't&amp;nbsp;&lt;EM&gt;rex&lt;/EM&gt; the raw data now because there's no point. You have your fields. You might need to do some renaming or extracting some parts of their contents but the bulk of your results you already have.&lt;/P&gt;&lt;P&gt;If you want to manipulate only some events, use the&amp;nbsp;&lt;EM&gt;if()&lt;/EM&gt; function in your eval statement (possibly with&amp;nbsp;&lt;EM&gt;searchmatch()&lt;/EM&gt; condition).&lt;/P&gt;&lt;P&gt;And that's it.&lt;/P&gt;&lt;P&gt;Don't overthink it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 16:21:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752319#M242634</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-27T16:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752324#M242635</link>
      <description>&lt;P&gt;Hi Rick,&lt;BR /&gt;These queries were given to me by someone to automate; when i look at closely they are using rex to get the values into those columns based on some pattern.. after the search filter on host with OR condition&lt;/P&gt;&lt;P&gt;these are rex related in each query - five queries -&amp;nbsp; what could be an easy way to get these so that it covers all patterns that are in each rex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;|rex field=_raw "\"httpStatusCode\":\"(?&amp;lt;httpStatusCode&amp;gt;\d+)\",.*?\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;\d+)\",.*?\"errorDescription\":\"(?&amp;lt;errorDescription&amp;gt;[^\"]+)\""&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)"&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;/P&gt;&lt;P&gt;|spath input=_raw&lt;BR /&gt;|rex field=_raw "errorCode:\s*(?&amp;lt;errorCode&amp;gt;\d+)"&lt;BR /&gt;|rex field=_raw "errorDescription:\s*(?&amp;lt;errorDescription&amp;gt;[^}]+)"&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)"&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;| rex field=_raw "dd\.trace_id=(?&amp;lt;traceId&amp;gt;[^,]+)"&lt;BR /&gt;|transaction traceId&lt;BR /&gt;|rex field=_raw "\"httpStatusCode\":\"(?&amp;lt;httpStatusCode&amp;gt;\d+)\",.*?\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;\d+)\",.*?\"errorDescription\":\"(?&amp;lt;errorDescription&amp;gt;[^\"]+)\""&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;/P&gt;&lt;P&gt;|rex field=_raw "\"httpStatusCode\":\"(?&amp;lt;httpStatusCode&amp;gt;\d+)\",.*?\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;\d+)\",.*?\"errorDescription\":\"(?&amp;lt;errorDescription&amp;gt;[^\"]+)\""&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)"&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;/P&gt;&lt;P&gt;|spath input=_raw&lt;BR /&gt;|rex field=_raw "errorCode:\s*(?&amp;lt;errorCode&amp;gt;\d+)"&lt;BR /&gt;|rex field=_raw "errorDescription:\s*(?&amp;lt;errorDescription&amp;gt;[^}]+)"&lt;BR /&gt;|rex field=_raw "dd\.service=(?&amp;lt;service&amp;gt;[^,]+)"&lt;BR /&gt;|rex field=_raw "http\.endpoint=(?&amp;lt;path&amp;gt;[^,]+)"&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 17:22:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752324#M242635</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T17:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: UNION just like SQL....</title>
      <link>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752331#M242636</link>
      <description>&lt;P&gt;Rick, should i give you the whole query so you would get an idea&lt;/P&gt;&lt;P&gt;all condtions and rex everything together for all 5 queries&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 18:19:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/UNION-just-like-SQL/m-p/752331#M242636</guid>
      <dc:creator>Raj_Splunk_Ing</dc:creator>
      <dc:date>2025-08-27T18:19:33Z</dc:date>
    </item>
  </channel>
</rss>

