- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello folks,
Been busting my head here.. trying to pull data from multiple sourcetypes which I thought would run like:
Index=test sourcetype=A OR sourcetype=B | search host=* | where <appname> ="value" AND
| table Host, IPAddress, Appname
host is a field in both sourcetypes and IP related info is in B. Just trying to pull out host, it's IP address, and the app in question. What I get is a real long host list (so that's good) with a few IP's and a few apps..
Looking abit like this:
Host | IPAddress |Appname
host1 | IP |
host2 | ip |
host3 | | appname
host4| | appname
so on and so forth
seems like any place that shows an ip address refuses to show an appname and vice versa??
Still acts the same. I pulled each part separately so I know the data is good.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


IP addresses and app names are in separate events and the query shown does nothing to put them together so Splunk shows them as separate events.
There are several ways to put the events together. The one I like most is the stats command, not for any stats, but for the grouping feature.
index=test sourcetype=A OR sourcetype=B host=*
| where Appname ="value"
| stats values(*) as * by host
| table host, IPAddress, Appname
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


IP addresses and app names are in separate events and the query shown does nothing to put them together so Splunk shows them as separate events.
There are several ways to put the events together. The one I like most is the stats command, not for any stats, but for the grouping feature.
index=test sourcetype=A OR sourcetype=B host=*
| where Appname ="value"
| stats values(*) as * by host
| table host, IPAddress, Appname
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
let me make sure I got this correct. So in this situation I can go:
Stats values(IPAddress) AS IP, values(AppName) by host
|table IPAddress, AppName, Host
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

One small remark - host is one of the default fields and is (or at least should be in a properly working Splunk installation) always filled with a value. So searching for host=* seems a bit pointless.
