Splunk Enterprise

How to create table from two different system logs basis on some condition

sahiljindal339
New Member

we have two system logs:

1.   "Exception in fetching FR response for warehouse published with BusinessKey=XYZ"

2.  "Sucessfully extract data for BusinessKeyValue='XYZ' "

i just want to  create table   [Time of log of First System , Time of Second System ] 

where BusinessKey==BusinessKeyValue

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It's not clear what the results should look like so you may need to modify this query.

(index=foo "Exception in fetching FR response for warehouse published with BusinessKey=*") OR (index=bar "Sucessfully extract data for BusinessKeyValue=*")
| eval key=coalesce(BusinessKey, BusinessKeyValue)
| eval firstTime=if(searchmatch("Exception in fetching FR response"),_time,NULL), secondTime=if(searchmatch("Sucessfully extract data"), _time, NULL)
| stats min(firstTime) as "Time of log of First System", min(secondTime) as "Time of Second System" by key

The coalesce function is used to produce a field common to both events since they don't share a field name.  The stats command combines events based on their shared "key" field value.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...