Splunk Search

combinig two search commands

vjtechie67
New Member

I have 2 indexers which are having the same columns
Index1:
Name DOB Age
A 5/1/1990 25
B 7/1/2010 6

Index2:

Name DOB Age
C 5/1/2000 15
D 7/1/2003 13

I need to combine both and provide output as below. I will use this to create graphs.

Output:

Name DOB Age
A 5/1/1990 25
B 7/1/2010 6
C 5/1/2000 15
D 7/1/2003 13

Please help me. Can i use append command?

Tags (3)
0 Karma

jplumsdaine22
Influencer

Or if you want to make it complicated try this

[ search [| tstats count WHERE index=2 OR index=1 by index | fields index] | search index=* | stats count by index | fields index ] | table Name DOB Age | sort 0 Name
0 Karma

woodcock
Esteemed Legend

Like this:

index=index1 OR index=index2
| table Name DOB Age
| sort 0 Name
0 Karma

javiergn
Super Champion

Simply do:

index=index1 OR index=index2
| table Name, DOB, Age
0 Karma
Get Updates on the Splunk Community!

What's New in Splunk Observability - October 2025

What’s New?  We’re excited to announce the latest enhancements to Splunk Observability Cloud and share what’s ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened Audit Trail v2 wasn’t written in isolation—it was shaped by your voices. In ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...