Splunk Search

Filter multisearch results after matching on _time

pholderness
New Member

Definitely a noob, and I must be missing something simple...

I have two log files reporting the same error at similar times. I am trying to correlate the two. LDAP authentication failure from both the LDAP server log and the application log.

Using:

| multisearch [search index=1 "222"] [search index=2 "222"] 

returns the desired results, but I would like to filter the results down to those where I have a match in both searches based on the timestamp. For instance, if there are 10 events returned from the first search and 1 returned from the second I would like to show just those two based on a matching timestamp (or bucket if need be.)

Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try this. It will return events where two or more fall in the same 1-minute bucket. Adjust the bucket size as necessary to reduce the likelihood of two events from the same index.

(index=index1 "222") OR (index=index2 "222") | bucket span=1m _time 
| stats count, list(*) as * by _time
| where count > 1
| fields - count
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try this. It will return events where two or more fall in the same 1-minute bucket. Adjust the bucket size as necessary to reduce the likelihood of two events from the same index.

(index=index1 "222") OR (index=index2 "222") | bucket span=1m _time 
| stats count, list(*) as * by _time
| where count > 1
| fields - count
---
If this reply helps you, Karma would be appreciated.
0 Karma

pholderness
New Member

Oh so close! This does exactly what you have described. However, when I try to view the events I only get to see one of the two. Is there a way that I can see them both?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try the updated query.

---
If this reply helps you, Karma would be appreciated.
0 Karma

pholderness
New Member

The updated query does give me what I was looking for. A million thanks!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...