Splunk Search

three queries that produce tables, need to combine the results into one table

okretzer
Engager

Need some help with and advance joining of 3 queries

I have three queries that produce tables,  I need to combine the results into one table.  The first query will produce a table with 10 fields with a count for each, the other two only produce one field with a count but I want all the results to display in one table.

 

Table 1:

{My Search Criteria}  PassedResult=0| stats count by riskcheckName| sort count desc

 

Table 2:

{My Search Criteria}  PassedREsult=0 Golden_Key_Failed=Failed |stats count by Golden_Key_Failed | replace Failed WITH "Risk Score Fail" IN  Golden_Key_Failed

 

Table 3:

{My Search Criteria}  PassedIAM=0 SN_Does_Not_Exist=Failed |stats count by SN_Does_Not_Exist | replace Failed WITH "SN Does Not Exist" IN  SN_Does_Not_Exist

 

thanks for any helo

Labels (1)
0 Karma
1 Solution

General_Talos
Path Finder

Try using append

{My Search Criteria}  PassedResult=0| stats count by riskcheckName| sort count desc

| append [ | search {My Search Criteria}  PassedREsult=0 Golden_Key_Failed=Failed |stats count by Golden_Key_Failed | replace Failed WITH "Risk Score Fail" IN  Golden_Key_Failed]

| append [ | search {My Search Criteria}  PassedIAM=0 SN_Does_Not_Exist=Failed |stats count by SN_Does_Not_Exist | replace Failed WITH "SN Does Not Exist" IN  SN_Does_Not_Exist]

View solution in original post

0 Karma

General_Talos
Path Finder

Try using append

{My Search Criteria}  PassedResult=0| stats count by riskcheckName| sort count desc

| append [ | search {My Search Criteria}  PassedREsult=0 Golden_Key_Failed=Failed |stats count by Golden_Key_Failed | replace Failed WITH "Risk Score Fail" IN  Golden_Key_Failed]

| append [ | search {My Search Criteria}  PassedIAM=0 SN_Does_Not_Exist=Failed |stats count by SN_Does_Not_Exist | replace Failed WITH "SN Does Not Exist" IN  SN_Does_Not_Exist]
0 Karma

okretzer
Engager

Thank you for the response, this worked , we tweaked it a little after trying your solution. the final query ended like this ( due to rows being added in original query)

 

{My Search Criteria}  PassedResult=0 | stats count by riskcheckName | rename riskcheckName as column | rename count as "row 1"

| append

    [| search {My Search Criteria} PassedIAM=0 Golden_Key_Failed=Failed  | dedup ID |stats count as “Golden Key Failed”  | transpose]

| append

    [search {My Search Criteria} PassedIAM=0 SN_Does_Not_Exist=Failed  | dedup ID | stats count as " SN Does Not Exist" | transpose]

| rename column as "Cause of Failure"

| rename "row 1" as Count

| sort "Cause of Failure"

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...