Splunk Search

How to search multiple indexes and display results in a single table?

carlpier
Explorer

Hello,

I am looking for a way to play in a single table the results of two different indexes.
The two searches are:

index="imwaccesslog" sourcetype="IMWAccessLog" URI = /nbd-rest/rest/mch/inquiry/Inquiry/recuperaProfiloUtente | stats count Max(ETsec)

AND

index="nbdrest-performance" sourcetype="PerfNBDCustomTSV" Service =  DBDisposizioniServiceImpl.recuperaProfiloUtenteBOL | stats count Max(ETms)

Any help would be greatly appreciated.

Thanks in advance!

0 Karma

MuS
Legend

Hi carlpier,

Something like this sould work:

 index="imwaccesslog" OR index=nbdrest-performance sourcetype="IMWAccessLog" OR sourcetype="PerfNBDCustomTSV" URI=/nbd-rest/rest/mch/inquiry/Inquiry/recuperaProfiloUtente OR Service=DBDisposizioniServiceImpl.recuperaProfiloUtenteBOL | stats count Max(ETms) Max(ETsec) 

Hope this helps to get you started ...

cheers, MuS

0 Karma

carlpier
Explorer

thanks, I would like to separate the two counts by adding a where conditions for both searches:

eventstats perc95(ETsec) as resp_time_95_L by FIELD1 | where ETsec < resp_time_95_L | chart count avg(ETsec) stdev(ETsec) range(ETsec) min(ETsec) max(ETsec) by FIELD1| sort count | reverse

and

eventstats perc95(ETms) as resp_time_95_P by FIELD2 | where ETms < resp_time_95_P | chart count
avg(ETms) stdev(ETms) range(ETms) min(ETms) max(ETms) by FIELD2| sort count | reverse

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...