Splunk Search

Correlate different events with a common value

Burton_snow82
Engager

Hi all, I'm a new Splunk user and I would like to have some help from you.

I have two query:

First query:

index=osb source=/applog/MtRot/ROT/proxy.log 3548 PS_WS_OM_NOTIFY
| xmlkv maxinputs=10000
| table OrderID transactionID StatusCode StatusDescription   

Result:

OrderID transactionID StatusCode StatusDescription 
3548      98f02a              5                       Completed

Second query (executed after the first query result):

index=osb source=/applog/MtRot/ROT/proxy.log PS_WS_OM_NOTIFY 98f02a(from the first query)
| xmlkv maxinputs=10000
| table transactionID ResultCode ResultDescription

The two query have the "transactionID" as a common value, so I'd like to create a unique query in order to show one raw with all these field

table OrderID transactionID StatusCode StatusDescription ResultCode ResultDescription

Any suggestion? Thank you very much

Labels (1)
0 Karma
1 Solution

renjith_nair
Legend

Try

index=osb source=/applog/MtRot/ROT/proxy.log PS_WS_OM_NOTIFY
|stats values(OrderID) as OrderID ,values(StatusCode ) as StatusCode ,values(StatusDescription ) as StatusDescription ,values(ResultCode ) as ResultCode ,values(ResultDescription) as ResultDescription by transactionID 

If you want the latest data only, then you may replace "values" with "latest"

---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

Burton_snow82
Engager

Thank you again, now it works!!

0 Karma

Burton_snow82
Engager

Thank you Renjith for your support, I tried with your query but it doesn't show any result. Maybe because  the query need the  xmlkv maxinputs=10000 ? Thank you

0 Karma

renjith_nair
Legend

yep sure, add all your search terms before the stats.

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

renjith_nair
Legend

Try

index=osb source=/applog/MtRot/ROT/proxy.log PS_WS_OM_NOTIFY
|stats values(OrderID) as OrderID ,values(StatusCode ) as StatusCode ,values(StatusDescription ) as StatusDescription ,values(ResultCode ) as ResultCode ,values(ResultDescription) as ResultDescription by transactionID 

If you want the latest data only, then you may replace "values" with "latest"

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...