Splunk Search

Splunk search for 2 deferent log line from 2 deferent sources

bhatganapatik
Loves-to-Learn

Hello Forum

I am facing problem related with 2 lines search 

my logs has information like this

1:  data received 

2: data origin form XXXXX company 

3: data identifier code  is  YYYYY  

4.  data not supported 

 

want  search  XXXXX and YYYYY  (i.e Manufacturer name and data identifier code)  and  get the result in one single query. In our case both information are received in deferent log lines. 

Can someone help us here to get the search string format. 

Thanks in advance. 

Labels (4)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @bhatganapatik,

you should share some additional information to better help you!

In addition:

  • you have two different groups of events to correlate or both fields are in the same event?
  • you want to correlate events from both the sources or only search for a pair of values (e.g. company="company1" and data_identifier_code="12345")?
  • did you already extracted fields? if not you should also share a sample of both sources.
  • is there a common key between the two sources (e.g. data_identifier_code)?

Ciao.

Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...