Splunk Search

combine 2 index with one common field

anhtran
New Member

Hello

i have index=sqltem with the sourcetype=temp-log with the following field : starttime, endtime, user_id, dbname, instruments_processed, inst_skipped, error_nums

Then I have another index=jobinfo with the sourcetype=jobinfo with the field
jobid
user_id
database
status
jobstarttime
jobfinishtime

As you see only user_id is a common field.

I would like to have a table that will show the all the fields on both index. How can I do that?

Thank you very much.

Tags (1)
0 Karma

fdi01
Motivator

try :

index=sqltem sourcetype=temp-log |join user_id  [search index=jobinfo  sourcetype=jobinfo ] |table  starttime  endtime  user_id  dbname  instruments_processed inst_skipped  error_nums jobid database status jobstarttime jobfinishtime

or

index=sqltem|jobinfo  |table  starttime  endtime  user_id  dbname  instruments_processed inst_skipped  error_nums jobid database status jobstarttime jobfinishtime
0 Karma

stephane_cyrill
Builder

HI try this:

index=sqltem OR index=jobinfo|table starttime, endtime, user_id,
dbname, instruments_processed, inst_skipped,
error_nums,jobid,user_id,database,status,jobstarttime,jobfinishtime

YOU CAN USE ......|fields ........ AT THE PLACE OF ........|table........

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...