Splunk Enterprise

How to create table from two different system logs basis on some condition

sahiljindal339
New Member

we have two system logs:

1.   "Exception in fetching FR response for warehouse published with BusinessKey=XYZ"

2.  "Sucessfully extract data for BusinessKeyValue='XYZ' "

i just want to  create table   [Time of log of First System , Time of Second System ] 

where BusinessKey==BusinessKeyValue

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It's not clear what the results should look like so you may need to modify this query.

(index=foo "Exception in fetching FR response for warehouse published with BusinessKey=*") OR (index=bar "Sucessfully extract data for BusinessKeyValue=*")
| eval key=coalesce(BusinessKey, BusinessKeyValue)
| eval firstTime=if(searchmatch("Exception in fetching FR response"),_time,NULL), secondTime=if(searchmatch("Sucessfully extract data"), _time, NULL)
| stats min(firstTime) as "Time of log of First System", min(secondTime) as "Time of Second System" by key

The coalesce function is used to produce a field common to both events since they don't share a field name.  The stats command combines events based on their shared "key" field value.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...