Splunk Search

How do I write a combined search query that allows me to pick a time from the first search and then use this time to look for log events in the second search that happened witthin 30 seconds of the first.

ahuseid
New Member

I would like to write a search query that allows me to pick a _time from the first and use it to search all the events in the second search (different sourcetype) happening within 30 seconds of the time picked.

Thanks.

Tags (3)
0 Karma

woodcock
Esteemed Legend

You need the map command; check out the accepted answer here:

http://answers.splunk.com/answers/232781/find-all-events-of-type-x-that-do-not-have-an-even.html

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...