Splunk Search

Column Merging, how to?

bilgin
New Member

The below search script successfully charts one table with two separate set of search results each has the individual columns. Trouble is, we need the column as merged into one column. Note that not each event type has a result, thus some of the events will have null entry.
Does anyone can light my way?
Thanks.
Here is the search script I am using.

eventType="event1" 
| chart count(eval(time<4000)) as event1LessThan4Sec, count as TotalCount1 by siteID
| rename siteID as "ID for 1"
| eval SLAsMet1=event1LessThan4Sec/TotalCount1
| appendcols [ search eventType="event2" 
    | chart count(eval(time<2000)) as event2LessThan2Sec, count as TotalCount2 by siteID
    | rename siteID as "ID for 2"
    | eval SLAsMet2=event2LessThan2Sec/TotalCount2
]
Tags (1)
0 Karma

southeringtonp
Motivator

So you just want one field containing the value of either "ID for 1" or "ID for 2", with the assumption that only one of them will contain a value ?

If so, you can always use something like:

| eval siteID=coalesce("ID for 1", "ID for 2")
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...