Splunk Search

How to edit my search to get a table of data from multiple indexes?

carlpier
Explorer

Hello,

I’m looking for to get a table from the the search results from two indexes:

index="imwaccesslog" OR index="nbdrest-performance" 
sourcetype=IMWAccessLog OR sourcetype="PerfNBDCustomTSV" 
URI="/nbd-rest/rest/nbd/inquiry/Inquiry/getUtente" OR Service="DBInquiryServiceImpl.estraiRapportiUtente" 
| stats max(ETsec) as m_LOG max(ETms) as m_PERF | table URI, m_LOG, Service, m_PERF

The result I'm currently getting is:

URI m_LOG   Service m_PERF
     4.681               63

The result I would like to get:

URI                                       m_LOG Service                                m_PERF
/nbd-rest/rest/nbd/inquiry/Inquiry/getUtente 4.681 DBInquiryServiceImpl.estraiRapportiUtente 63

Thanks in advance for the assistance.

0 Karma

Raghav2384
Motivator
try 

stats max(ETsec) as m_LOG ,max(ETms) as m_PERF by URI,Service,_time | table URI, m_LOG, Service, m_PERF

thanks,
Raghav
0 Karma

markthompson
Builder

Try this:
(index="imwaccesslog" AND sourcetype=IMWAccessLog) OR (index="nbdrest-performance" AND sourcetype="PerfNBDCustomTSV" )

0 Karma

carlpier
Explorer

I'm sorry, but the result is' still the same as the previous:

URI m_LOG Service m_PERF
4.681 63

fields URI and Service are not valued

thank you for what you can do

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...