Splunk Search

Using another index and replace the missing values in the current index data.

veerendra_modi
Loves-to-Learn

I have a index say index1 having Air Details and ServerName of which some Air is missing for some serverNames.

I have another index say index2 in this index i am getting the Air details that are missing in index1.

Want to use index2 Air where i dont have values in index 1.

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There needs to be a connection between index1 and index2 so Splunk knows which ServerName belongs to which Air Details.  Once you have that you can join the two indexes something like this

(index=index1 OR index=index2)
| stats values(*) as * by ServerName
---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...

Operationalizing TDIR: Building a More Resilient, Scalable SOC

Optimizing SOC workflows with a unified, risk-based approach to Threat Detection, Investigation, and Response ...