Splunk Search

How to create a table with fields form two different indexes

maryamchar
Explorer

I want to create a table with all fields from two different indexes.

Index=A |rename fieldA as field1 |table field1 fieldAA fieldAB field AC
index= B |rename fieldB as field1 | table field1 fieldBB fieldBC

I want a table shows all fields including common field which is filed1

|table field1 fieldAA fieldAB field AC fieldBB fieldBC

Tags (1)
0 Karma
1 Solution

Vijeta
Influencer

Try something like-

index=A or index=B| eval field1=coalesce(fieldA,fieldB)| stats values(*) as * by field1

View solution in original post

0 Karma

koshyk
Super Champion

Another option is to do using transaction, so the events can be clubbed together

index=A or index=B
| rename fieldA as field1 
| rename fieldB as field1
| transaction field1 
| table field1 fieldAA fieldAB field AC fieldBB fieldBC
0 Karma

maryamchar
Explorer

Thank you! It worked!!

0 Karma

koshyk
Super Champion

thanks. Please upvote if it helped. cheers

0 Karma

maryamchar
Explorer

Sorry but I ran the search now, the table only shows certain values from one index only and ignore the other indexes. Is there a reason for that ? why the table has empty fields even though it exists on data

0 Karma

maryamchar
Explorer

one more question realted to same query above. I want to show the number of count by field1 ? How would I do. that

|stats count by field 1

0 Karma

koshyk
Super Champion

if you do
|stats count by field 1

This will show just count for field1 after clubbing the transaction

if you want to retain the original table and then count, better to do
index=A or index=B
| rename fieldA as field1
| rename fieldB as field1
| transaction field1
| streamstats count as field_count by field
| table field1 field_count fieldAA fieldAB field AC fieldBB fieldBC

0 Karma

Vijeta
Influencer

Try something like-

index=A or index=B| eval field1=coalesce(fieldA,fieldB)| stats values(*) as * by field1
0 Karma

maryamchar
Explorer

Thank you! It worked!

0 Karma

maryamchar
Explorer

if I want to have stats values for certain fields only from both indexes, how would I do that ? Thank you!!

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...