Splunk Search

append search to different sources

arjangoos
Path Finder

Hi,

I want to combine to searches:

index=bla | stats count(al_responsecode) as "Total per responseCode al" by al_responsecode | appendcols [ search index=blaat2 sourcetype=access_log | stats count(responseCode) as "Total per responseCode" by responseCode] | table al_responsecode responseCode "Total per responseCode al" "Total per responseCode"

1e search:
response code; total
200;122
204;16
302;13
304;23
401;19
404;44
505;1

2e search:
200;113
204;9
304;23
401;19
404;4

outcome:
200;122;113
204;16;9
302;13;23
304;23;19
401;19;4
404;44

505;1

But I want:
200;122;113
204;16;9
302;13;0
304;23;23
401;19;19
404;44;4
505;1;0

0 Karma

somesoni2
Revered Legend

Try like this (after chart, there will a column for each index. replace the correct index name in the rename command)

index=blah OR (index=blah2 sourcetype=access_log)  | eval ResponseCode=coalesce(al_responsecode,responseCode) 
| chart  count over ResponseCode by index | rename "blah" as "Total per responseCode al" , "blah2" as  "Total per responseCode" 
0 Karma
Get Updates on the Splunk Community!

Fueling your curiosity with new Splunk ILT and eLearning courses

At Splunk Education, we’re driven by curiosity—both ours and yours! That’s why we’re committed to delivering ...

Splunk AI Assistant for SPL 1.1.0 | Now Personalized to Your Environment for Greater ...

Splunk AI Assistant for SPL has transformed how users interact with Splunk, making it easier than ever to ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...