Splunk Search

Map search

BhuvanM
New Member

Hi,

I am using below query to search all correlation ID based on a search string and get the SOAPResponse using map search, But this is returning a partial search results. Is my query looks good ?

index=pivotal sourcetype=ApplicationTest "SearchString" CorrelationId="*" | table CorrelationId | map search="search index=pivotal sourcetype=ApplicationTest $CorrelationId$ SOAPResponse"

Thanks, Bhuvan.

 

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like:

index=pivotal sourcetype=ApplicationTest ("SearchString" OR "SOAPResponse") CorrelationId="*"
| stats values(*) as * by CorrelationId
| search "SearchString"
0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...