<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extend search results data by correlation-id (and exclude on other messages) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685476#M233889</link>
    <description>&lt;P&gt;Hello, I have 500 HTTP messages in my access log. Also I have corresponding events from other log sources with the same correlation-id. Now I want to join the information to enhance the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access Log Events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2024-04-25T11:00:26+00:00 [info] type=access  status=500 xCorrelationId=90e2a321-f522-466f-9ffa-72cbdaa1a576 ....

2024-04-25T10:15:25+00:00 [info] type=access status=500 xCorrelationId=9b1833f5-776b-44c3-92d7-d603abdfecf8 ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other Events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2024-04-25T10:15:24+00:00 xCorrelationId=9b1833f5-776b-44c3-92d7-d603abdfecf8  NoHandlerFoundException: No endpoint GET&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;My actual intention is, to exclude the results from main search, if there is another event with the same correlation-id but containing specific exceptions like "&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;NoHandlerFoundException". That means, i need a search per result from the main search.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Do you know a solution for this?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thanks!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2024 13:25:28 GMT</pubDate>
    <dc:creator>sscholl</dc:creator>
    <dc:date>2024-04-25T13:25:28Z</dc:date>
    <item>
      <title>Extend search results data by correlation-id (and exclude on other messages)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685476#M233889</link>
      <description>&lt;P&gt;Hello, I have 500 HTTP messages in my access log. Also I have corresponding events from other log sources with the same correlation-id. Now I want to join the information to enhance the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access Log Events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2024-04-25T11:00:26+00:00 [info] type=access  status=500 xCorrelationId=90e2a321-f522-466f-9ffa-72cbdaa1a576 ....

2024-04-25T10:15:25+00:00 [info] type=access status=500 xCorrelationId=9b1833f5-776b-44c3-92d7-d603abdfecf8 ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other Events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2024-04-25T10:15:24+00:00 xCorrelationId=9b1833f5-776b-44c3-92d7-d603abdfecf8  NoHandlerFoundException: No endpoint GET&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;My actual intention is, to exclude the results from main search, if there is another event with the same correlation-id but containing specific exceptions like "&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;NoHandlerFoundException". That means, i need a search per result from the main search.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Do you know a solution for this?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thanks!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 13:25:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685476#M233889</guid>
      <dc:creator>sscholl</dc:creator>
      <dc:date>2024-04-25T13:25:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extend search results data by correlation-id (and exclude on other messages)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685484#M233893</link>
      <description>&lt;LI-CODE lang="markup"&gt;&amp;lt;main index&amp;gt; NOT [search &amp;lt;other source&amp;gt; NoHandlerFoundException | stats count by xCorrelationId | fields xCorrelationId | format]&lt;/LI-CODE&gt;&lt;P&gt;However, depending on how may exceptions you have, you may run into limitations as the sub-search with the format command will essentially return a long string which might be too large to be parsed in the main search.&lt;/P&gt;&lt;P&gt;Another way to do it is to search both sources, and correlate by xCorrelationId and exclude those xCorrelationId's which have the exception, but this still means you are retrieving both full sets of events and correlating them before you can filter out any.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:10:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685484#M233893</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-04-25T14:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Extend search results data by correlation-id (and exclude on other messages)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685538#M233912</link>
      <description>&lt;P&gt;The number of values in the subsearch cannot be too large as it will perform really badly, but one slight change to&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;subsearch is to do&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;main index&amp;gt; NOT [
    search &amp;lt;other source&amp;gt; NoHandlerFoundException 
    | stats values(xCorrelationId) as search
    | format]&lt;/LI-CODE&gt;&lt;P&gt;which will perform faster. It will change the outer search from&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;main index&amp;gt; NOT ( ( ( xCorrelationId=A OR xCorrelationId=B OR... ) ) )&lt;/LI-CODE&gt;&lt;P&gt;to&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;main index&amp;gt; NOT ( ( ( A OR B OR C OR D ... ) ) )&lt;/LI-CODE&gt;&lt;P&gt;where A, B etc are the values or xCorrelationId&lt;/P&gt;&lt;P&gt;The key point is having a field name 'search' in the output rather than xCorrelationId, which changes the effect of the&amp;nbsp;&lt;STRONG&gt;format&lt;/STRONG&gt; command.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 01:32:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extend-search-results-data-by-correlation-id-and-exclude-on/m-p/685538#M233912</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-04-26T01:32:38Z</dc:date>
    </item>
  </channel>
</rss>

