We are using splunk for Jenkins logs so events are coming to splunk ,how to combine one index data with another index, can you give me proper search query and answer.
index=index1 OR index=index2
where we can see combined results of two index, can you please give me proper answer.
Based on the information you have provided, this is a proper answer. Try putting it into a search and see what results you get. If they are not the results you were expecting, please explain what it is that you want to see, providing examples of your events, details of how you want them combined, etc.
Actually I want to see combined data of two indexes into one index in splunk ,can you give me proper search query and answer
Splunk doesn't work that way, unless you want to collect from both indexes and store the events again in a third index. But what would be the point of doing that?
What will you do with the combine index which can't be done by using OR in the search?
We have a requirement to do so ,can we have any other way two combine 2 indexes data into 1 index in splunk,can we try from terminal side or using search query
Why not ingest the data into one index in the first place?
How to ingest the data into one index ,can you elaborate little bit
How do you currently ingest your data?