Splunk Search

Splunk search for 2 deferent log line from 2 deferent sources

bhatganapatik
Loves-to-Learn

Hello Forum

I am facing problem related with 2 lines search 

my logs has information like this

1:  data received 

2: data origin form XXXXX company 

3: data identifier code  is  YYYYY  

4.  data not supported 

 

want  search  XXXXX and YYYYY  (i.e Manufacturer name and data identifier code)  and  get the result in one single query. In our case both information are received in deferent log lines. 

Can someone help us here to get the search string format. 

Thanks in advance. 

Labels (4)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @bhatganapatik,

you should share some additional information to better help you!

In addition:

  • you have two different groups of events to correlate or both fields are in the same event?
  • you want to correlate events from both the sources or only search for a pair of values (e.g. company="company1" and data_identifier_code="12345")?
  • did you already extracted fields? if not you should also share a sample of both sources.
  • is there a common key between the two sources (e.g. data_identifier_code)?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...