Splunk Search

Form a single statistics from two different sources on common parameters

Hi,
I am using two different sources, for e.g.source1 and source2, which contains different numeric error on same timestamps.
for e.g.

Source1: 03:43:15.780 errorvalue=202

Source2: 03:43:15.780 errorvalue=222

I want to get the statistics as a combination of both the sources where the Timestamp is a common column, second column containing the error string from source1, third column containing error string from source2 and third giving match or no match clause.

such as

Time Stamp source1 source2 match

03:43:15.780 202 222 yes

Please help

0 Karma

Motivator

I'll make a couple of assumptions:

  1. The errorvalue field has the same name in both sources
  2. The match or no match clause means you want to know if the errorvalue from source1 matches the errorvalue from source2

If these are both correct, try a search like the following:

source=source1 source=source2 errorvalue=* | eval source1=if(source=source1,errorvalue,null()) | eval source2=if(source=source2,errorvalue,null()) | stats count by _time source1 source2 | eval match=if(source1=source2,"yes","no") | fields - count

I'm sure there is a more elegant way of writing this search, but this should do what you want.

0 Karma

Legend

What do you mean by "match or no match"? What rule is there for this?

0 Karma