Splunk Search

Paring events in a table

trever
Loves-to-Learn

I have events that happen in pairs. A request and a response from a server. What I would like to do is be able to easily table those side by side. Right now they return in the normal table but id like to be able to see them side by side instead. Right now I'm rexing out the data to able it. Is there a way to accomplish this? I need them in pairs of 2. So if some reason there is 4, which isn't normal, it would do two rows with 2 columns.

This is what I'm doing right now:

[query]
| rex field=message "(Received|Sent) raw (?<processor>.*) (response|request) (?<raw_message>.*})"
| table raw_message
0 Karma

to4kawa
Ultra Champion
 [query]
 | rex field=message "(?<method>Received|Sent) raw (?<processor>.*) (?<status>response|request) (?<raw_message>.*})"
 |stats list(method) as method list(status) as status list(raw_message) as raw_message by processor
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...