Splunk Search

How to combine two reports if only one report has a timestamp?

Borntowin
Loves-to-Learn Everything

Hi Team,

   I have two reports where one report(report1)has timestamp field where other report(report2) doesn't have it has only the date in the source filename. Report 2 will not be send it to splunk in realtime. Now i would like to combine those two reports and populate the data. I have extracted the date from source.(search time)  from report1 & report2 one common field is there.. I have already ingested the file how do i compare the date and populate the data. Can anyone suggest "where clause" can be used in this case?

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You can't use a where command to combine two events.

You could use a stats command with a by clause to combine information from events with a common value in one or more of the fields.

However, without a clearer description of what you are trying to achieve and what events you are working with, it is difficult to say what might be most appropriate.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...