Splunk Search

combinig two search commands

vjtechie67
New Member

I have 2 indexers which are having the same columns
Index1:
Name DOB Age
A 5/1/1990 25
B 7/1/2010 6

Index2:

Name DOB Age
C 5/1/2000 15
D 7/1/2003 13

I need to combine both and provide output as below. I will use this to create graphs.

Output:

Name DOB Age
A 5/1/1990 25
B 7/1/2010 6
C 5/1/2000 15
D 7/1/2003 13

Please help me. Can i use append command?

Tags (3)
0 Karma

jplumsdaine22
Influencer

Or if you want to make it complicated try this

[ search [| tstats count WHERE index=2 OR index=1 by index | fields index] | search index=* | stats count by index | fields index ] | table Name DOB Age | sort 0 Name
0 Karma

woodcock
Esteemed Legend

Like this:

index=index1 OR index=index2
| table Name DOB Age
| sort 0 Name
0 Karma

javiergn
Super Champion

Simply do:

index=index1 OR index=index2
| table Name, DOB, Age
0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...