Splunk Search

combine 2 index with one common field

anhtran
New Member

Hello

i have index=sqltem with the sourcetype=temp-log with the following field : starttime, endtime, user_id, dbname, instruments_processed, inst_skipped, error_nums

Then I have another index=jobinfo with the sourcetype=jobinfo with the field
jobid
user_id
database
status
jobstarttime
jobfinishtime

As you see only user_id is a common field.

I would like to have a table that will show the all the fields on both index. How can I do that?

Thank you very much.

Tags (1)
0 Karma

fdi01
Motivator

try :

index=sqltem sourcetype=temp-log |join user_id  [search index=jobinfo  sourcetype=jobinfo ] |table  starttime  endtime  user_id  dbname  instruments_processed inst_skipped  error_nums jobid database status jobstarttime jobfinishtime

or

index=sqltem|jobinfo  |table  starttime  endtime  user_id  dbname  instruments_processed inst_skipped  error_nums jobid database status jobstarttime jobfinishtime
0 Karma

stephane_cyrill
Builder

HI try this:

index=sqltem OR index=jobinfo|table starttime, endtime, user_id,
dbname, instruments_processed, inst_skipped,
error_nums,jobid,user_id,database,status,jobstarttime,jobfinishtime

YOU CAN USE ......|fields ........ AT THE PLACE OF ........|table........

0 Karma
Get Updates on the Splunk Community!

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...