<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to correlate log events in three different files and display as a dashboard report with drilldown? in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255879#M16021</link>
    <description>&lt;P&gt;@bkumarm can you put the final layout you are looking for in a spreadsheet and post a screenshot. I am not sure I understand how you would like the final layout to be. From the above sample, it appears, you would like one table to show Pass/Fail for Application 1. Then a second table that shows For each ID, Pass/Fail by Application. Are these ID unique? From you sample data, they don't appear to be unique. How do you want to show if there's more than one occurrence of the same ID? &lt;/P&gt;</description>
    <pubDate>Fri, 04 Dec 2015 14:48:15 GMT</pubDate>
    <dc:creator>sundareshr</dc:creator>
    <dc:date>2015-12-04T14:48:15Z</dc:date>
    <item>
      <title>How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255859#M16001</link>
      <description>&lt;P&gt;I have three different log files with entries as below  sample.&lt;BR /&gt;
Below is the description of what I am trying to achieve&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;search file1 for occurance of "Error()" and the value "414d512050423120202020565d7c2320099b2a" - if exists then it is &lt;STRONG&gt;pass&lt;/STRONG&gt; in application1 and proceed to search the other two files with 414d512050423120202020565d7c2320099b2a for error.&lt;/LI&gt;
&lt;LI&gt;search file1 for occurance of "Error("some message") with 414d512050423120202020565d7c2320099b2a - if yes then it is &lt;STRONG&gt;fail&lt;/STRONG&gt; in application1 and proceed to search the other two files&lt;/LI&gt;
&lt;LI&gt;search the file2 for the occurances of 414d512050423120202020565d7c2320099b2a and list them&lt;/LI&gt;
&lt;LI&gt;search the file3 for occurances of 414d512050423120202020565d7c2320099b2a and if there is an entry mark them as failed in application2&lt;/LI&gt;
&lt;LI&gt;Display a dashboard combining relevant data such as time and status all the entries for 414d512050423120202020565d7c2320099b2a from the three files .&lt;/LI&gt;
&lt;LI&gt;when I click on the entry in dashboard 414d512050423120202020565d7c2320099b2a , it should take me to the log entry , and display entries from all the three files.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;I have tried using combining the three files using "eventtype" and the searching. however I am not getting the intended output.&lt;BR /&gt;
any suggestions?&lt;/P&gt;

&lt;P&gt;-Bharath &lt;/P&gt;

&lt;P&gt;File1: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Mon Nov 16 2015 08:26:51 [0x00350016][mgmt][notice] source-mq(CommonBinaryPassthrough): tid(111): Service installed on port,414d512050423120202020565d7c2320099b2a, Error(Invalid Data)
Mon Nov 16 2015 08:26:51 [0x00350014][mgmt][notice] source-mq(CommonMsgPassthrough): tid(111): Operational state up,414d5120505344322020202006f84f53cd9bb002, Error()
Mon Nov 16 2015 08:26:51 [0x00350014][mgmt][notice] mpgw(CommonBinaryPassthrough): tid(111): Operational state up,414d5120505344322020202006f84f53cd9bb002, Error()
Mon Nov 16 2015 08:26:51 [0x80e00344][mq][notice] mq-qm(Common_EAIT): tid(9171729): Connection succeeded,414d512050423120202020565d7c2320099b2a, Error(URL ….)
Mon Nov 16 2015 08:26:51 [0x80e00344][mq][notice] mq-qm(Common_EAIT): tid(9171633): Connection succeeded,414d51205042312020202055a1b9d422a6e502, Error()
Mon Nov 16 2015 08:26:51 [0x00350016][mgmt][notice] source-mq(CommonDataPassthrough): tid(111): Service installed on port, Error(" Could not get response")
Mon Nov 16 2015 08:26:51 [0x00350014][mgmt][notice] source-mq(CommonBinaryPassthrough): tid(111): Operational state up, Error(" Invalid Data found")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;File2:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;07:27:52.820',X'414d5120505344322020202006f84f53cd9bb002',X'414d51205042513157452055c28d792f442e8f',6,'TEST.MSG.TEST1'
2015-11-16 07:28:00.176457,'TEST.MSG.TEST2',NULL,X'414d512050423120202020565d7c2320099b2a',X'414d51205042513157452055c28d792f442e8f'
2015-11-16 07:28:00.178487,'TEST.MSG.TEST3',NULL,X'414d5120505344322020202006f84f53cd9bb002',X'414d512050425131574544312020202055c28d792f442e8f'
2015-11-16 07:28:02.709618,'TEST.MSG.TEST1',DATE '2015-11-16' GMTTIME '07:28:00.950',X'414d5120505344322020202006f84f53cd9bb002',X'414d51205042513157452055c28d792f442e8f',6
2015-11-16 07:28:04.066394,'TEST.REPLY',NULL,NULL,NULL,NULL,X'414d5120505344322020202006f84f53cd9bb002',X'414d51205042513157452055c28d792f442e8f'
2015-11-16 07:40:31.533186,'TEST.MSG.TEST1 '2015-11-16' GMTTIME '07:40:31.510',X'414d51205042312020202055a1b9d422a6e502',X'000000000000000000000000000000000000000000000000',4,''
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;File3:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;******* MessageID: X'414d5120505344322020202006f84f53cd9bb002' *******
******* 2015-11-03 11:26:29.663561 TEST.MSG.TEST1 *******
( ['APP1' : 0x11d1f2b0]
  (0x01000000:Name):RecoverableException = (
    (0x03000000:NameValue):File                 = '/mypath/Comptest.cpp' (CHARACTER)
    (0x03000000:NameValue):Line                 = 497 (INTEGER)
    (0x03000000:NameValue):Function             = 'test' (CHARACTER)
    (0x03000000:NameValue):Type                 = 'TestNode' (CHARACTER)
    (0x03000000:NameValue):Name                 = 'TEST_MSG' (CHARACTER)
    (0x03000000:NameValue):Label                = 'TEST_MSG' (CHARACTER)
    (0x03000000:NameValue):Catalog              = 'msgs' (CHARACTER)
    (0x03000000:NameValue):Severity             = 3 (INTEGER)
    (0x03000000:NameValue):Number               = 2230 (INTEGER)
    (0x03000000:NameValue):Text                 = 'Caught exception and rethrowing' (CHARACTER)

******* MessageID: X'414d51205042312020202055a1b9d422a6e502' *******
******* 2015-11-03 11:26:45.663461 TEST.MSG.TEST2 *******
( ['APP2' : 0x11d1f2b1]
  (0x01000000:Name):RecoverableException = (
    (0x03000000:NameValue):File                 = '/mypath/Comptest.cpp' (CHARACTER)
    (0x03000000:NameValue):Line                 = 497 (INTEGER)
    (0x03000000:NameValue):Function             = 'test' (CHARACTER)
    (0x03000000:NameValue):Type                 = 'TestNode' (CHARACTER)
    (0x03000000:NameValue):Name                 = 'TEST_MSG' (CHARACTER)
    (0x03000000:NameValue):Label                = 'TEST_MSG' (CHARACTER)
    (0x03000000:NameValue):Catalog              = 'msgs' (CHARACTER)
    (0x03000000:NameValue):Severity             = 3 (INTEGER)
    (0x03000000:NameValue):Number               = 2230 (INTEGER)
    (0x03000000:NameValue):Text                 = 'Caught another exception and rethrowing' (CHARACTER)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 03 Dec 2015 01:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255859#M16001</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T01:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255860#M16002</link>
      <description>&lt;P&gt;This is quite a bit for one question.  Let me break it into different sized an shaped chunks, ask a few questions and see if this makes sense:&lt;/P&gt;

&lt;P&gt;You have this data in Splunk already, right?  How are the events broken?  My guess is file1 and file2 are probably pretty reasonably cut into events.  I'm not sure how Splunk would handle file3 - does it break your example that yuo gave into two events, one for each MessageID?  Or does it break stuff into bunches of smaller lines?  The former will work, the latter will be less than optimal so that's the first thing we need to confirm and/or fix.&lt;/P&gt;

&lt;P&gt;Once linebreaking is straightened out, then we need to extract some things and create fields for what probably won't be automatically recognized.  You'll need error messages, and  .... stuff.  Other things.  Rex is fun, though, so this will be fun too!&lt;/P&gt;

&lt;P&gt;All that grouping and "if this then search that" stuff in your description - that's all just your current idea on how to do it, right?  Because I'd just group everything on that MessageID using stats or transaction and use a couple of evals to write in "pass" or "fail" or whatever.  We'll have to get to this after we get the previous stuff straightened out, but it shouldn't be terribly difficult once the groundwork has been laid.&lt;/P&gt;

&lt;P&gt;Once those are all done, the dashboard and drilldown won't be difficult - it'll just be the search we generated above saved in a dashboard panel.  I don't do custom drilldowns often, in fact I haven't done one yet, but I'm pretty sure I've stumbled across that before and it didn't look hard.  Probably easy-peasy, just like the rex stuff!&lt;/P&gt;

&lt;P&gt;With that in mind, then, first step - can you check the event breaking on file3?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 02:51:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255860#M16002</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-03T02:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255861#M16003</link>
      <description>&lt;P&gt;You should extract the ids as fields to write better search.&lt;/P&gt;

&lt;P&gt;Looking at your raw data, below search should work for you. You might need to change it according to your requirement.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* source="file1" OR source="file2" OR source="file3" earliest=-1h
|stats count(eval(like(_raw, "%Error%414d512050423120202020565d7c2320099b2a%"))) as count by source
|eval status=if(count&amp;gt;0,"Fail","Pass")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 03 Dec 2015 04:14:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255861#M16003</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2015-12-03T04:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255862#M16004</link>
      <description>&lt;P&gt;Thanks  Rich,&lt;BR /&gt;
 Answers to your question on break in the third file:&lt;BR /&gt;
NO, the log does not break, that line was  my mistake while posting it. The log is continuous. however the log structure remains same. &lt;BR /&gt;
What I am trying to do is create a table that displays time, message(without duplicate) , status (based on the search described earlier) and may be few more related fields.&lt;BR /&gt;
from this table if the user clicks on  a particular message ID, it should list all log entries with that ID ( from all three files) . currently it goes to the search result which has all entries.&lt;BR /&gt;
hope this answers your doubt.&lt;/P&gt;

&lt;P&gt;Renjith,&lt;BR /&gt;
  I will try your suggestion and update. &lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Bharath&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 05:08:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255862#M16004</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T05:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255863#M16005</link>
      <description>&lt;P&gt;Thanks Rich,&lt;BR /&gt;
Answers to your question on break in the third file:&lt;BR /&gt;
NO, the log does not break, that line was my mistake while posting it. The log is continuous. however the log structure remains same. &lt;BR /&gt;
What I am trying to do is create a table that displays time, message(without duplicate) , status (based on the search described earlier) and may be few more related fields.&lt;BR /&gt;
from this table if the user clicks on a particular message ID, it should list all log entries with that ID ( from all three files) . currently it goes to the search result which has all entries.&lt;BR /&gt;
hope this answers your doubt.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 05:09:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255863#M16005</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T05:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255864#M16006</link>
      <description>&lt;P&gt;Your answer does not provide me the expected solution.  the value 414d512050423120202020565d7c2320099b2a is runtime generated ..hence we have extract it dynamically&lt;BR /&gt;
secondly, First I want search for Error and if it failed i.e. there is come data within Error(....) &lt;BR /&gt;
I want to use the extracted ID values to search in other files and then display them in a single table&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 10:33:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255864#M16006</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T10:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255865#M16007</link>
      <description>&lt;P&gt;Do you have a base search that actually creates a dashboard like how you like it, lacking only the proper drill down?  Or is the dashboard/report lacking in other ways?&lt;/P&gt;

&lt;P&gt;(I'd think the latter, and if so it comes back initially to the poor event breaking of file3, which hopefully I'll have some time later today to look at in more detail).&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 13:48:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255865#M16007</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-03T13:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255866#M16008</link>
      <description>&lt;P&gt;renjith.nair: I second your notion to get some proper extractions going.  That and fixing the line breaking in file3 is going to be critical to making everything else flow.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 13:50:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255866#M16008</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-03T13:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255867#M16009</link>
      <description>&lt;P&gt;Yes, I have created a common eventtype that combines the three files for searching.&lt;BR /&gt;
however the error string is foung only in File1. &lt;BR /&gt;
I have also set field extractions and I am able to get these fields independently from each file.&lt;BR /&gt;
what I am failing is to correlate between them and generate a common table with Status based on error message.&lt;BR /&gt;
I have also created Field aliasing. Finally I saved the search output from File1 into a lookup test.csv file.&lt;BR /&gt;
however I am NOT clear how to use this for searching in other two files&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 13:57:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255867#M16009</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T13:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255868#M16010</link>
      <description>&lt;P&gt;File3 does not have a line break. that is mistake while pasting it here.&lt;BR /&gt;
 I have created a common eventtype that combines the three files for searching.&lt;BR /&gt;
however the error string is foung only in File1. &lt;BR /&gt;
I have also set field extractions and I am able to get these fields independently from each file.&lt;BR /&gt;
what I am failing is to correlate between them and generate a common table with Status based on error message.&lt;BR /&gt;
I have also created Field aliasing. Finally I saved the search output from File1 into a lookup test.csv file.&lt;BR /&gt;
however I am not clear how to use this for searching in other two files&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 13:59:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255868#M16010</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T13:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255869#M16011</link>
      <description>&lt;P&gt;Great, sounds like a lot of this is working already. &lt;/P&gt;

&lt;P&gt;Given the little I know about this problem, I'd just hook all the error ones all up together based on MessageID.&lt;/P&gt;

&lt;P&gt;So if you pull out a field called "ErrorValue" from the Error(blahblah) sections (so in that case ErrorValue=blahblah), and have "MessageID" (your big long GUID-looking thing) as your way to join things together, then you'd have something vaguely akin to this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;mybasesearch eventtype=mystuff 
| transaction MessageID maxspan=5m
| search ErrorValue=* 
| ... more stuff here, maybe
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The transaction will group your events together where MessageID matches, then the second search will filter that only to those where ErrorValue exists (thus getting rid of the entire transactions where there was no error).  This only works if ErrorValue doesn't exist in events with the empty parentheses, but that's probably the case in your extracts.&lt;/P&gt;

&lt;P&gt;NOTE: stats may also be able to be used and may be more efficient, but will require more detail and thinking to set up.  And we're still in comments here. &lt;/P&gt;

&lt;P&gt;Also note, we'll still have to fix file3 so each items comes in looking right.  You want each &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;**** MessageID.... 
(then all the way to the next ...)
**** MessageID ... &amp;lt;-- that started the new event
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to be one event.&lt;/P&gt;

&lt;P&gt;If you want to try that your self while waiting for someone else (including me) to figure it out, sinc eyou seem quite capable, here's the &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.2/Data/Indexmulti-lineevents"&gt;right section of the docs&lt;/A&gt;.  You'll probably need &lt;CODE&gt;SHOULD_LINEMERGE=true&lt;/CODE&gt; and &lt;CODE&gt;LINE_BREAKER = ******* MessageID:&lt;/CODE&gt; but I'm not sure of the escaping involved.  Probably just all the stars &lt;CODE&gt;\*\*...&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;I guess if we get close to a solution with this comment string, I'll have some cleanup and rearranging of things to do in this thread.  That's OK, though.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 15:01:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255869#M16011</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-03T15:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255870#M16012</link>
      <description>&lt;P&gt;Sounds like the end result is a dashboard of sorts. If that is true, does all of this have to be in one search query? Why not break it up into multiple queries and display results in dashboard panels. You could display the pass/fail in a single value panel and the events below them. If this is acceptable, you could do something like this&lt;/P&gt;

&lt;P&gt;Add in input field to enter (414d512050423120202020565d7c2320099b2a) &lt;CODE&gt;token=id&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;search file1 for occurrence of "Error()" and the value "414d512050423120202020565d7c2320099b2a" - if exists then it is pass else fail. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=log3 $id$  | eval status=if(match(_raw, "Error\(\)"), "Pass", "Fail") | table status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;search the file2 for the occurances of 414d512050423120202020565d7c2320099b2a and list them&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=log3 $id$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;search the file3 for occurances of 414d512050423120202020565d7c2320099b2a and if there is an entry mark them as failed in application2. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=logs3  $id$ | stats count | eval status=if(count&amp;gt;0, "Pass", "Fail") | table status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Display a dashboard combining relevant data such as time and status all the entries for 414d512050423120202020565d7c2320099b2a from the three files . when I click on the entry in dashboard 414d512050423120202020565d7c2320099b2a , it should take me to the log entry , and display entries from all the three files.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=logs* $id$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Now, if these must be in one search. you could do something like this&lt;/P&gt;

&lt;P&gt;Sounds like the end result is a dashboard of sorts. If that is true, does all of this have to be in one search query? Why not break it up into multiple queries and display results in dashboard panels. You could display the pass/fail in a single value panel and the events below them. If this is acceptable, you could do something like this&lt;/P&gt;

&lt;P&gt;Add in input field to enter (414d512050423120202020565d7c2320099b2a) &lt;CODE&gt;token=id&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;search file1 for occurrence of "Error()" and the value "414d512050423120202020565d7c2320099b2a" - if exists then it is pass else fail. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=log3 $id$  | eval status=if(match(_raw, "Error\(\)"), "Pass", "Fail") | table status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;search the file2 for the occurances of 414d512050423120202020565d7c2320099b2a and list them&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=log3 $id$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;search the file3 for occurances of 414d512050423120202020565d7c2320099b2a and if there is an entry mark them as failed in application2. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=logs3  $id$ | stats count | eval status=if(count&amp;gt;0, "Pass", "Fail") | table status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Display a dashboard combining relevant data such as time and status all the entries for 414d512050423120202020565d7c2320099b2a from the three files . when I click on the entry in dashboard 414d512050423120202020565d7c2320099b2a , it should take me to the log entry , and display entries from all the three files.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=logs* $id$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Now, if you must have all this in one search, you could try something like this (please tweak appropriately)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=logs1 414d5120505344322020202006f84f53cd9bb002 | eval id="414d5120505344322020202006f84f53cd9bb002" | stats count as a1r by id
| appendcols [search source=logs3  414d5120505344322020202006f84f53cd9bb002 | eval id="414d5120505344322020202006f84f53cd9bb002" | stats count as a2r]
| append [search  source=logs* 414d5120505344322020202006f84f53cd9bb002 | eval e=_raw | table e ]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 03 Dec 2015 15:30:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255870#M16012</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2015-12-03T15:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255871#M16013</link>
      <description>&lt;P&gt;Quite a bit work on it. On File3 I just wanted check if the MessageID is present, if so update the STATUS as fail.&lt;BR /&gt;
another tricky bit here is that I want to classify and display which application it failed.&lt;BR /&gt;
if Error(blahblah) is present in File1 - status is failed in app1&lt;BR /&gt;
if no Error found then pass&lt;BR /&gt;
If ID entry found in File3 Fail&lt;/P&gt;

&lt;P&gt;this to be displayed in a table.&lt;BR /&gt;
currently I am able to extract these values, displaying them by relating them is still a problem&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 17:50:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255871#M16013</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T17:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255872#M16014</link>
      <description>&lt;P&gt;I needed all this in one search and your suggestion worked fine when I know the string 414d5120505344322020202006f84f53cd9bb002 before . My problem is that I get this from File1 at runtime. They are generated by application1 and passed to application2 , application3 for keeping track of message.&lt;BR /&gt;
so I have to extract ID at runtime from File1 and then search for it in other two.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 18:11:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255872#M16014</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-03T18:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255873#M16015</link>
      <description>&lt;P&gt;Did you try creating a transaction on MessageID, as suggested?  If the transaction works at least to a large extent, we can most likely handle the rest of the problems.&lt;/P&gt;

&lt;P&gt;So, try creating a transaction on MessageID (the maxspan=5m will likely need adjusting).  You should get instead of 17 separate events, you should get groups of multiple source events in one "transaction" event.  That's how you group all this together.  &lt;/P&gt;

&lt;P&gt;At least using hte technique I've been proposing.  On the other hand, sundareshr's answer may work perfectly well with a few tweaks, let me comment there to reply to your last question.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 18:25:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255873#M16015</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-03T18:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255874#M16016</link>
      <description>&lt;P&gt;Well in that case, you will have to extract the fields from each of the log files. Here are a couple of regex that could help&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;'(?&amp;lt;id&amp;gt;\w+)' this will get the id field from log3

,(?&amp;lt;id&amp;gt;\w{30,}), this wil get id from log1 &amp;amp; 2

.*\((?&amp;lt;emsg&amp;gt;[^\)]*) this will get  the message string from logs 1 &amp;amp; 2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then the following query should get your what you are looking for &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* sourcetype=* source=log1 id=* | eval a1=if(len(emsg)&amp;gt;0, "f", "p") | table id, a1 | join type=outer id [search index=* sourcetype=* source=log3 | eval a2="f"] | table id, a1, a2 | sort id | fillnull value="p"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 03 Dec 2015 21:15:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255874#M16016</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2015-12-03T21:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255875#M16017</link>
      <description>&lt;P&gt;you have given me a way to get the number or occurances . that is useful . however&lt;BR /&gt;
I tried a lot , but still could not reach to : Here is what I am trying out to get&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Transaction Status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;time    414d5120505344322020202006f84f53cd9bb002    Pass&lt;BR /&gt;
time    414d512050423120202020565d7c2320099b2a  Fail&lt;BR /&gt;
time    414d51205042312020202055a1b9d422a6e502  Fail&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;TransactionFail App1       TransactionFail App2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;time    414d5120505344322020202006f84f53cd9bb002&lt;BR /&gt;&lt;BR /&gt;
time    414d512050423120202020565d7c2320099b2a&lt;BR /&gt;&lt;BR /&gt;
time                         414d51205042312020202055a1b9d422a6e502&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 11:58:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255875#M16017</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-04T11:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255876#M16018</link>
      <description>&lt;P&gt;Due apologies, I missed to mention that I am searching on multiple files of each type, i,e. there are 10 files of type File1, 5 of type File2 and 1 of type File3&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 12:41:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255876#M16018</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-04T12:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255877#M16019</link>
      <description>&lt;P&gt;OK, that helps.  I'm getting a feel for the generic problem you are trying to really solve, and what it is that you are really after.  (And hopefully this will help some others understand better too).&lt;/P&gt;

&lt;P&gt;The remainder of this comment only sort of applies to you, and it's NOT meant to be critical, just explanation.  So don't take it poorly because it's certainly not meant to be taken that way.  It's more like some "generic explanation" that's probably the start of a good blog post some day.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;When we have these rather large scope problems we have to start somewhere.  The starts that are made are sometimes right and sometimes wrong, but in either case they help define the problem set better.  Sometimes it won't be apparent why we're asking something to be tried - usually explanations come after we decide if it is a good basis to continue working from or not. &lt;/P&gt;

&lt;P&gt;In my mind we come up with a spectrum of answers between two main problem sets (outside of technical issues or syntax fixing.)  &lt;/P&gt;

&lt;P&gt;At one end of the spectrum is "I have this data and I have some vague idea about something to do with it, please help me."  Those are often far easier because there's a lot of flexibility in the answer.  The answers can sometimes be totally unlike what they originally expected, but they love the answer anyway because it's great and solves their problem well.  &lt;/P&gt;

&lt;P&gt;The other end of the spectrum is "I have these reports we manually generate from tools X, Y and Z, I need to create that exact same report for Management only in Splunk now."  Those can be very difficult - I remember one time where the person was complaining about the font used in the footer because they couldn't make it match the old report.  The problem there for our part in trying to find a solution is a lack of flexibility.&lt;/P&gt;

&lt;P&gt;Your problem is somewhere in between.  It seems you have a very specific output you'd like in a format you want.  Are you replacing another tool's capabilities?  This is fine, we totally like doing that.  But it make the answers much harder because they now have to be "a certain right answer", not just "a right answer."  &lt;/P&gt;

&lt;P&gt;So, please continue bearing with us - we can probably get you where you are going, it just may take us a bit of trying and fiddling around before we really get going down the right path.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 13:47:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255877#M16019</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-04T13:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate log events in three different files and display as a dashboard report with drilldown?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255878#M16020</link>
      <description>&lt;P&gt;I am not replacing an existing tool, but I am trying to do a POC for log analytics.&lt;BR /&gt;
The requirement is to present in a dashboard the overall statistics of events in each log file and status message for each transaction based on the ID that gets attached to it.&lt;BR /&gt;
second requirement is to present a table that has correlation between logs and when I select a transaction ID it should take me to the search page which lists all the transactions,&lt;/P&gt;

&lt;P&gt;then ofcourse there is a need for displaying few graphs . &lt;BR /&gt;
I am able to show graphs and statistics ...however I am struggling with tables , specially combining multiple tables into one&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 14:32:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-correlate-log-events-in-three-different-files-and-display/m-p/255878#M16020</guid>
      <dc:creator>bkumarm</dc:creator>
      <dc:date>2015-12-04T14:32:02Z</dc:date>
    </item>
  </channel>
</rss>

