Splunk Join Type
Continue

Splunk Join Type

join command syntax details. SPL data types and clauses. AuthenticDumps offers its SPLK-1002 exam dumps pdf having a real and verified pool of Splunk Core Certified Power User SPLK-1002 queries. Join datasets on fields that have the same name. Join the Splunk Edge Hub beta program and receive your device Email [email protected]. Apache worker threads can be in one of the following states: This integration is only available on Kubernetes and Linux. Description: Indicates the type of join to perform. If youre familiar with SQL, the above example is shorthand for this:. Types of Join Commands There are two types of joins: left and inner. Machine Learning in Security: Detect Suspicious TXT Records …. join does indeed have the ability to match on multiple fields and in either inner or outer modes. / join left=L right=R where L. Description: Options to the join command. In Inner Join we join 2 dataset tables which is table A and B and the matching values from those tables is our results. Configure your inputs using Splunk Web on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder. Click Create New Input and then select Azure Metrics. join-options Syntax: type= (inner / outer / left) / usetime= / earlier= / overwrite= / max= Description: Arguments to the join command. The Splunk SPLK-1002 dumps are enough to help you get through the tough SPLK-1002 Splunk Core Certified Power User exam. Splunk isnt a db! it has the join command but its better to avoid it because its very slow! You could have two approaches: if you havent many events from the second host (less than 50,000) you can use the subsearch; if you have many events (more than 50,000) you have to use stats. You can also combine a search result set to itself using the selfjoin command. pid [] This joins the source, or left-side dataset, with the right-side dataset. In the Splunk Add-on for Microsoft Cloud Services, click Inputs. Subscribe to Support the channel: https://youtube. The union command runs on indexers in parallel where possible, and automatically interleaves results on the _time when processing events. Splunk (SPLK) Is a Good Investment >Wall Street Analysts Think Splunk (SPLK) Is a Good Investment. Outer Join (Left) Above example show the structure of the join command works. Returns data in various date formats. In Inner Join we join 2 dataset tables which is table A and B and the matching values from those tables is. Now how do I combine both the fields into 1 as follows. The union command appends or merges event from the specified datasets, depending on whether the dataset is streaming or non-streaming and where the command is run. Configure inputs using Splunk Web. SplunkTrust 04-03-2015 07:23 AM Maybe its a typo, but Splunk joins arent the same as SQL joins. See Descriptions for the join-options argument in this topic. Splunk Join The join command is used to combine the results of a sub search with the results of the main search. 1st Dataset: with four fields - movie_id, language, movie_name, country. Our Splunk SPLK-1003 exam dumps can operate on all of your devices like cellular phones, PC, tablets, Mac, I-phone, I-pad, laptop, desktop-computer, and the other electronic gadgets. search 1: fields aaaa aaa aaAa sjdk. Configure Azure Metrics inputs for the Splunk Add. Subscribe to Support the channel: https://youtube. The user produces the data by means of any device like- web apps, sensors, or computers. The below eval condition giving me the result as follows. SPL2 supports a set of built-in data types, such as strings, numbers, Booleans, arrays, objects, timespans, relative times, and datasets. Apache HTTP Server — Splunk Observability Cloud documentation. Same as in Splunk there are two types of joins. Splunk query based on the results of another query. Transfer decimal value into ASCII code in text str. pid This joins the source data from the search pipeline with the right-side dataset. I have a Splunk search outputs result as follows. The detection uses the answer field from the Network Resolution data model with message type ‘response’ and record_type as ‘TXT’ as input to the model. join コマンドの type パラメータに outer を指定した場合、メインサーチに含まれる値全てを出力します (左外部結合)。 以下の例では、メインサーチとサブサーチ両方に存在する「3」だけでなく、メインサーチのみに存在する「1」及び「2」も出力されています。 Splunk. Prior to joining Splunk, she worked for EMC and Citrix as a Data Scientist. index=job_index middle_name=Foe / join type=left job_title [search. The ones with the lightning bolt icon highlighted in yellow are the ones that are accelerated. SplunkTrust 03-06-2017 11:27 AM / join type=left means that the stuff coming into the left side (through the pipe symbol) will be matched and kept, whereas the stuff coming in from the subsearch on the right side will only be kept if it matches the left side. 0 Karma Reply suhprano Path Finder 03-18-2011 11:22 PM. List of Login attempts of splunk local users Follow the below query to find how can we get the list of login attempts by the Splunk local user using SPL. Using Splunk Splunk Search Left JOIN using two searches Solved! Jump to solution Left JOIN using two searches davidcraven02 Communicator 12-20-2017 01:51 AM I have these two searches below and I want to join the fieldname Path from the first query to the second query using the machine as the unique identifier. Rows from each dataset are merged into a single row if the where predicate is satisfied. The data is joined on the product_id field, which is common to both datasets. Solved: Left JOIN using two searches. Run the event log query for users that exist in the array, e. Configure Azure KQL Log Analytics input for the Splunk Add. AuthenticDumps offers its SPLK-1002 exam dumps pdf having a real and verified pool of Splunk Core Certified Power User SPLK-1002 queries. Splunk in an alt >How to combine 2 fields into 1 in Splunk in an alt. join-options Syntax: type= (inner / outer / left) / usetime= / earlier= / overwrite= / max= Description: Arguments to the join command. A left join produces ALL of the results from the main search joined with matching results from. Click Create New Input and then select Azure Consumption (Billing). AuthenticDumps is a reputed network that produces the most flexible Splunk SPLK-1002 exam dumps prep product for your SPLK-1002 Splunk Core Certified Power User Exam test. Topics Include: 5% on Using Transforming Commands for Visualizations. 10% on Creating and Using Workflow Actions. but wanted that somewhere in the middle after a specific field. Splunk - warren Nov 2, 2020 at 13:38 Add a comment Your Answer By clicking Post Your Answer, you agree to our terms of service, privacy policy and cookie policy Not the answer youre looking for?. For those not fully up to speed on Splunk, there are certain fields that are written at index time. We get four different types of joins based on the subset of data we are picking from the two tables. Machine Learning in Security: Detect Suspicious TXT Records. The out come i am trying to get is to join the queries and get Username, ID and the amount of logins. Step 1: Start by creating a temporary value that applies a zero to every ip address in the data. format_datetime (datetime , format) bin. Description: Indicates the type of join to perform. 1 Answer Sorted by: 0 Your query should work, with some minor tweaks. When you create a user in Splunk Cloud Platform, you assign the user one or more roles. Splunk left jion is not giving as exepcted. Splunk Cloud Platform>Manage users, roles, and capabilities in Splunk Cloud Platform. Subscribe to Support the channel: https://youtube. The detection uses the answer field from the Network Resolution data model with message type ‘response’ and record_type as ‘TXT’ as input to the model. Descriptions for the join-options argument type Syntax: type=inner / outer / left Description: Indicates the type of join to perform. pid [] This joins the source, or left-side dataset, with the right-side dataset. I have a Splunk search outputs result as follows. This SPLK-1002 real questions were created and arranged by. Now how do I combine both the fields into 1 as follows. Splunk Core Certified Power User is a required prerequisite to the Splunk Enterprise Certified Admin certification track, Splunk Cloud Certified Admin certification track, and the Splunk Core Certified Advanced Power User certification track. Splunk isnt a db! it has the join command but its better to avoid it because its very slow! You could have two approaches: if you havent many events from the second host (less than 50,000) you can use the subsearch; if you have many events (more than 50,000) you have to use stats. Its unnecessary (and undesirable mostly) to use join if you can just use: `sourcetype=test1 [search=test2 / dedup col1 col2 / fields col1 col2] This is basically your original search, but it should work just fine unless youve got more than a few thousand distinct col1,col2 value pairs. Description: The traditional join command joins the results from the main results pipeline with the search pipeline results provided as the last argument. com/c/vikasjha001?sub_confirmation=1Need help? Message me on LinkedIn: https://www. Eg: / join fieldA fieldB type=outer - See join on docs. Splunk currently has an average brokerage recommendation (ABR) of 1. com to request to join the Splunk Edge Hub beta program and see Onboarding in the Get started with Splunk Edge Hub topic to learn how to join the Splunk Edge Hub beta program. How to Improve Your Data Model Acceleration in Splunk. Using Splunk Splunk Search Left JOIN using two searches Solved! Jump to solution Left JOIN using two searches davidcraven02 Communicator 12-20-2017 01:51 AM I have these two searches below and I want to join the fieldname Path from the first query to the second query using the machine as the unique identifier. Hi everyone !! Today we will learn about Join command. Hi everyone !! Today we will learn about Join command. uuid [ search msg=Reported a result / dedup uuid sortby +_time] / fillnull value= / table _time, L. Splunk software extracts different kinds of knowledge from your IT data (events, fields, timestamps, and so on) to help you harness that information in a better, smarter, more focused way. index=_audit action=login attempt / stats count by user info action _time / sort - info 2. With this Splunk SPLK-1002 online practice test engine, you can analyze your preparation for the SPLK-1002 Splunk Core Certified Power User exam and overcome the shortcomings which will help. join does indeed have the ability to match on multiple fields and in either inner or outer modes. : using semantics such as isin () or contains (); or ii) Enumerate the group members and perform a foreach () type loop. For example, ago (1h) is one hour before the current clocks reading. 1 Answer Sorted by: 0 Your query should work, with some minor tweaks. I am very new to Splunk and basically been dropped in the deep end!! also very new to language so any help and tips on the below would be great. Splunk Employee 01-02-2013 04:40 PM sourcetype=alphalog / JOIN type=inner ModuleNum [ search sourcetype=betalog] OR this search sourcetype=alphalog [ search sourcetype=betalog MNumber=* / FIELDS MNumber ] I think at least one of the two examples above should work if Im following. Join datasets on fields that have different names. Each role contains a set of capabilities that determine which actions a user assigned to that role can perform. The Splunk Distribution of OpenTelemetry Collector uses the Smart Agent receiver with the Apache HTTP Server monitor type to monitor Apache web servers using information mod_status provides. Types of Joins in SQL To Know. In the example, the fields onlineOrderTime and TeleSaleTime exist only. Free disk space (filesystems) — Splunk Observability Cloud. The Splunk Distribution of OpenTelemetry Collector uses the Smart Agent receiver with the Chrony NTP monitor type to monitor NTP data from a chrony server, such as clock skew and per-peer stratum. Splunk Join The join command is used to combine the results of a sub search with the results of the main search. These fields are _time, source (where the event originated; could be a filepath or a protocol/port value), sourcetype (type of machine data) and host. Available to Splunk Observability Cloud customers and free trial users. The join command expects a list of field names on which events from each search will be matched. com/c/vikasjha001?sub_confirmation=1Need help? Message me on LinkedIn: https://www. Descriptions for the join-options argument type Syntax: type=inner / outer / left Description: Indicates the type of join to perform. The detection results in DNS responses that have ‘is_suspicious_score’ > 0. Whats the difference between StartTime and _time in Splunk?. Apache worker threads can be in one of the following states: Join the Splunk #observability user group Slack channel to communicate with customers. Usage Of Splunk Commands : Join. List of Login attempts of splunk local users Follow the below query to find how can we get the list of login attempts by the Splunk local user using SPL. Returns the time offset relative to the time the query executes. Splunk how to combine two queries and get one answer>Splunk how to combine two queries and get one answer. type Syntax: type= Description: Indicates the type of join to perform. Enter the Name, Azure App Account, Subscription ID, Data Type, Interval, Index, Sourcetype, Max days to query and Start Date using the information in the following input parameter table. In both inner and left joins, events that match are joined. search 2: fields aaaa aaa aaAa sjdk jdiw dwdd. I use /join -type outer to combine these two search table , but I dont know how to remove the different fields or keep same fields with search 1 in search 2. Splunk Application Performance Monitoring Full-fidelity tracing and always-on profiling to enhance app performance Splunk IT Service Intelligence AIOps, incident intelligence and full visibility to ensure service performance View all products Solutions KEY INItiatives. Syntax The required syntax is in bold. I have a Splunk search outputs result as follows. One or more of the fields must be common to each. Solved: what does join type=left _raw actually do when i. Step 2: Use the join command to add in the IP addresses from the blacklist, including every IP address that matches Step 3: Filter the search using “where temp_value =0” and filter out all the. Splunk – warren Nov 2, 2020 at 13:38 Add a comment Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer youre looking for?. Click Create New Input and then select Azure KQL Log Analytics. Same as in Splunk there are two types of joins. com/Documentation/Splunk/latest/SearchReference/Join. Some of this information is extracted at index time, as Splunk software indexes your IT data. Join the Splunk Edge Hub beta program and receive your device Email [email protected]. Identifying data model status To check the status of your accelerated data models, navigate to Settings -> Data models on your ES search head: You’ll be greeted with a list of data models. In the Splunk Add-on for Microsoft Cloud Services, click Inputs. i) Enumerate relevant group members into an array. It is a very important command of Splunk, which is basically used for combining the result of sub search with the main search and importantly one or more fields should be common in both the result-sets. Subscribe to Support the channel: https://youtube. List of Login attempts of splunk local users Follow the below query to find how can we get the list of login attempts by the Splunk local user using SPL. ago (a_timespan) format_datetime. To learn about even more support options, see Splunk. Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide Available to Splunk Observability Cloud customers and free trial users To learn how to join, see Get Started with Splunk Community - Chat groups To learn about even more support options, see Splunk Customer Success. Syntax join [join-options] [field-list] subsearch Required arguments subsearch. The join command is used to merge the results of a. Eg: / join fieldA fieldB type=outer - See join on docs. 448182-300 _time is recorded as 2020-04-28T15:38:13. The union command appends or merges event from the specified datasets, depending on whether the dataset is streaming or non-streaming and where the command is run. Usage Of Splunk Commands : Join. 10% on Creating Tags and Event Types. It is a very important command of Splunk, which is basically used for. See Types of expressions in the SPL2 Search Manual. It analyzes semi-structured data and logs generated by various processes with proper data modeling as per the need of the IT companies. Splunk Documentation>union. Types of Join Commands There are two types of joins: left and inner. Basically, with join command, there are two joins is possible 1) Inner 2) Left or outer Now what are these two things take a look into the below figure So lets take a look Lets take an example: we have two different datasets. Description: Indicates the type of join to perform. With this Splunk SPLK-1002 online practice test engine, you can analyze your preparation for the SPLK-1002 Splunk Core Certified Power User exam and overcome the shortcomings which will help. I am very new to Splunk and basically been dropped in the deep end!! also very new to language so any help and tips on the below would be great. Splunk Application Performance Monitoring Full-fidelity tracing and always-on profiling to enhance app performance Splunk IT Service Intelligence AIOps, incident intelligence and full visibility to ensure service performance View all products Solutions KEY INItiatives. 1 Ive been looking at a recent event in Splunk with sourcetype WinHostMon, and I see two different values for StartTime and _time: StartTime=20200427223006. I am very new to Splunk and basically been dropped in the deep end!! also very new to language so any help and tips on the below would be great. The simplest join possible looks like this: / join left=L right=R where L. index=job_index middle_name=Foe / join type=left job_title [search index=job_index middle_name=Stu] If there is always one event being used from each dataset then appendcols may perform better. 10% on Using the Common Information Model (CIM) Add-On. SplunkTrust 03-06-2017 11:27 AM / join type=left means that the stuff coming into the left side (through the pipe symbol) will be matched and kept, whereas the stuff coming in from the subsearch on the right side will only be kept if it matches the left side. Splunk Answers Splunk Administration Deployment Architecture Installation Security Getting Data In Knowledge Management Monitoring Splunk Using Splunk Splunk Search Reporting Alerting Dashboards & Visualizations Splunk Development Building for the Splunk Platform Splunk Platform Products Splunk Enterprise Splunk Cloud Platform. Splunk isnt a db! it has the join command but its better to avoid it because its very slow! You could have two approaches: if you havent many events from the second host (less than 50,000) you can use the subsearch; if you have many events (more than 50,000) you have to use stats. Join options: 1-type: Syntax: type=inner / outer / left Description: Indicates the type of join to perform. She has a Master’s degree in Machine Learning from University of California, Santa Cruz. The metadata command is a generating command, which means it is the first command in a search. Same as in Splunk there are two types of joins. In the Splunk Add-on for Microsoft Cloud Services, click Inputs. Descriptions for the join-options argument type Syntax: type=inner / outer / left Description: Indicates the type of join to perform. One or more of the fields must be common to each result set. Syntax of Join: SELECT column- names FROM table- name1 JOIN table- name2 ON column- name1 = column- name2 WHERE condition Types of Joins in SQL Inner Join Left Join Right Join Full Join Below we explain different types of Joins in Detailed. To talk to chronyd, this integration mimics what the chronyc control program does on the wire. Splunk is a program that enables the search and analysis of computer data. index=job_index middle_name=Foe / join type=left job_title [search index=job_index middle_name=Stu] If there is always one event being used from each dataset then appendcols may perform better. If no fields are listed then all fields are used. / join left=L right=R where L. To learn how to join, see Get Started with Splunk Community - Chat groups. msg=Enqueued a recurring task / join type=outer left=L right=R where L. Splunk Application Performance Monitoring Full-fidelity tracing and always-on profiling to enhance app performance Splunk IT Service Intelligence AIOps, incident intelligence and full visibility to ensure service performance View all products Solutions KEY INItiatives. added a few more resources from my cheatsheet. Splunk currently has an average brokerage recommendation (ABR) of 1. Rounds all values in a timeframe and groups them. Basically, the difference between an inner and a left (or outer) join is how they treat events in the main pipeline that do not match any in the subpipeline. Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide. index=_audit action=login attempt / stats count by user info action _time / sort -. Splunk>How to Improve Your Data Model Acceleration in Splunk. Splunk Commands – Exploring of Join Commands and its >Splunk Commands – Exploring of Join Commands and its. 000-04:00 If the last part is timezone, there are two things that are strange about this:. Splunk software extracts different kinds of knowledge from your IT data (events, fields, timestamps, and so on) to help you harness that information in a better, smarter, more focused way. Configure inputs using Splunk Web. Splunk Join The join command is used to combine the results of a sub search with the results of the main search. Usage Of Splunk Commands : Join. Use either outer or left to specify a left outer join. Description: Options to the join command. Splunk Application Performance Monitoring Full-fidelity tracing and always-on profiling to enhance app performance Splunk IT Service Intelligence AIOps, incident intelligence and full visibility to ensure service performance. pid This joins the source data from the search pipeline with the right-side dataset. so if you have events in different indexes (index_A or index_B). field-list Syntax: . The simplest join possible looks like this: / join left=L right=R where L. 10% on Creating and Using Macros. How to Use the Splunk Join Command. You can use the ACS API to create users and roles, add capabilities to roles, and assign users to roles. In the SQL language we use join command to join 2 different schema where we get expected result set. A Splunk instance that forwards data to another Splunk instance is referred to as a forwarder. The simplest join possible looks like this: / join left=L right=R where L. Solved: Right join in Splunk. Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide Available to Splunk Observability Cloud customers and free trial users To learn how to join, see Get Started with Splunk Community - Chat groups To learn about even more support options, see Splunk Customer Success. Join options: 1-type: Syntax: type=inner / outer / left Description: Indicates the type of join to perform. At Splunk, she was a part of NLP and Enterprise Security teams. Join datasets on fields that have different names. Did you try index=a / join type=outer id [search index=b] / table id name sal desgn ? --- If this reply helps you, Karma would be appreciated. Wall Street Analysts Think Splunk (SPLK) Is a Good Investment. Splunk Commands – Exploring of Join Commands and its. Namratha Sreekanta is a Senior Software Engineer in the Splunk Machine Learning for Security team (SMLS). In Inner Join we join 2. Indexer An indexer is the Splunk instance that indexes data. Same as in Splunk there are two types of joins. Now how do I combine both the fields into 1 as follows The below eval condition giving me the result as follows / eval Details = Details + link I do not want to add that link at the end. Top 4 Main Types of Joins in SQL To Know. The Azure Consumption (Billing) input for the Usage Details data type collects data until one day prior to the current UTC time at every interval invocation. Optionally specifies the exact fields to join on. Download the Splunk Edge Hub mobile app and the Splunk App for Edge Hub and AR. Please reach out to me if you need any support on Splunk Development. How to execute a full outer join in splunk?. Step 1: Start by creating a temporary value that applies a zero to every ip address in the data. Our Splunk SPLK-1003 exam dumps can operate on all of your devices like cellular phones, PC, tablets, Mac, I-phone, I-pad, laptop, desktop-computer, and the other electronic gadgets. The out come i am trying to get is to join the queries and get Username, ID and the amount of logins. AuthenticDumps is a reputed network that produces the most flexible Splunk SPLK-1002 exam dumps prep product for your SPLK-1002 Splunk Core Certified Power User Exam test. Descriptions for the join-options argument type Syntax: type=inner / outer / left Description: Indicates the type of join to perform. time What Id like for convenience is to add an additional column with the difference between R. / join type=outer A [search index=idx2 sourcetype=src / dedup A] / A more performant way to merge results is with the statscommand, but that doesnt honor the requirement that index A trump index B. msg=Enqueued a recurring task / join type=outer left=L right=R where L. Outer Join (Left) Above example show the structure of the join command works. Description: Options to the join command. Inner Join Outer Join (Left) Above example show the structure of the join command works In Inner Join we join 2 dataset tables which is table A and B and the matching values from those tables is. Share Improve this answer Follow answered Feb 12, 2021 at 20:01 RichGRichG 8,68211 gold badge1818 silver badges2929 bronze badges. 83, on a scale of 1 to 5 (Strong Buy to Strong Sell), calculated based on the actual recommendations (Buy, Hold, Sell, etc. Using Splunk Splunk Search Left JOIN using two searches Solved! Jump to solution Left JOIN using two searches davidcraven02 Communicator 12-20-2017 01:51 AM I have these two searches below and I want to join the fieldname Path from the first query to the second query using the machine as the unique identifier. Join datasets on fields that have the same name Combine the results from a search with the vendors dataset. Splunk Core Certified Power User is a required prerequisite to the Splunk Enterprise Certified Admin certification track, Splunk Cloud Certified Admin certification track, and the Splunk Core Certified Advanced Power User certification track. added a few more resources from my cheatsheet. Splunk Join TypeA left join produces ALL of the results from the main search joined with matching results from the subsearch An inner join produces only results where the main search and subsearch match How to Use the Join Command in Splunk (+Example). Combine the results from a search with the vendors dataset. SplunkTrust 03-06-2017 11:27 AM / join type=left means that the stuff coming into the left side (through the pipe symbol) will be matched and kept, whereas the stuff. Updated scripts to ask for user input. The difference between an inner and a left (or outer) join is how the events are treated in the main search that do not match any of the events in the subsearch. SplunkTrust 04-03-2015 07:23 AM Maybe its a typo, but Splunk joins arent the same as SQL joins. Splunk Observability Cloud documentation>Chrony NTP — Splunk Observability Cloud documentation. You just have to invest your two weeks in the preparation. Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide Available to Splunk Observability Cloud customers and free trial users To learn how to join, see Get Started with Splunk Community - Chat groups To learn about even more support options, see Splunk Customer Success. If no fields are specified, all fields that are shared by both result sets will be used. but wanted that somewhere in the middle after a. com/c/vikasjha001?sub_confirmation=1Need help? Message me on LinkedIn: https://www. Eg: / join fieldA fieldB type=outer - See join on docs. join-options Syntax: [ type / max ] Description: Specify the type of join to perform and the maximum number of rows to join on. So, how the #?!@ do I do this in Splunk. Configure your inputs using Splunk Web on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder. The detection uses the answer field from the Network Resolution data model with message type ‘response’ and record_type as ‘TXT’ as input to the model. Basically, the difference between an inner and a left (or outer) join is how they treat events in the main pipeline that do not match any in the subpipeline. Combine the results from a search with. The difference between an inner and a left (or outer) join is how the events are treated in the main search that do not match any of the events in the subsearch. so if you have events in different indexes (index_A or. Inner Join Outer Join (Left) Above example show the structure of the join command works In Inner Join we join 2 dataset tables which is table A and B and the matching values from those tables is our results. All of these data types have corresponding literal syntax that you can use to represent constants in SPL expressions. We get four different types of joins based on the subset of data we are picking from the two tables. How to join 2 tables in Splunk based on shared column?. The simplest join possible looks like this: / join left=L right=R where L. The queries are from diff source, sourcetype and host. You can specify one or more . splunk query>Combining the results from 2 indexes in splunk query. Product Details : Product 1:- ABC123.