Splunk Search

How to separate out basic search of Splunk in two different columns?

AjayTakur
Loves-to-Learn Everything

I am new to Splunk and facing an issue in separating out the two columns of the query. I tried with the below query and found the results as shown below in table1

...|
append [search index="pd" "successful" "notif/output/" | stats count by _raw |fields count | rename _raw as Dtransfer] | 
append [search index="pd" "SBID=nr" "DM" "PAM=sende" "notif/archive/" | stats count by _raw |fields count | rename _raw as DMCopy]
 

1.png

How do I achieve the expected result shown in Table 2? I need to display two separate columns DtransferCount and DMCopyCount

2.png

 

 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Specify the name of the count field in the stats commands.

...|
append [search index="pd" "successful" "notif/output/" | stats count as DtransferCount by _raw |fields DtransferCount | rename _raw as Dtransfer] | 
append [search index="pd" "SBID=nr" "DM" "PAM=sende" "notif/archive/" | stats count as DDMCopyCount by _raw |fields DDMCopyCount | rename _raw as DMCopy]

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...