Knowledge Management

How to group input and output request log?

MayankMathur198
New Member

We have our webservice logs on splunk having separate request (input) and response(output) log. There is one common unique id field between request and response log. But I want to match events in such a way to have count on basis of "requst_name" from request log and "response_cd" (where response_cd is not "00")from response log.

Example of request and response events:

REQUEST EVENT:

TYPE=REQUEST,ID=ABCDEF,REQUST_NAME=API_LOGGING_INFO, DATE=YYYY-MM-DD,TIME=HH:MM:SS

RESPONSE EVENT :

TYPE=RESPOMSE, ID=ABCDEF,RESPONSE_CODE=00
(Response_cd may have different values)

I have tried transaction commond to group events and then search for non "00" response-cd but search is taking very long time.

Thanks in advance!

Tags (1)
0 Karma

msivill_splunk
Splunk Employee
Splunk Employee

As a starting point does the following help?

( source=request OR source=response ) response_cd != 00
| stats count by id, source
| stats count by id 
| where count > 1
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...