Splunk Search

How to combine two reports if only one report has a timestamp?

Borntowin
Loves-to-Learn Everything

Hi Team,

   I have two reports where one report(report1)has timestamp field where other report(report2) doesn't have it has only the date in the source filename. Report 2 will not be send it to splunk in realtime. Now i would like to combine those two reports and populate the data. I have extracted the date from source.(search time)  from report1 & report2 one common field is there.. I have already ingested the file how do i compare the date and populate the data. Can anyone suggest "where clause" can be used in this case?

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You can't use a where command to combine two events.

You could use a stats command with a by clause to combine information from events with a common value in one or more of the fields.

However, without a clearer description of what you are trying to achieve and what events you are working with, it is difficult to say what might be most appropriate.

0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...