Splunk Search

Splunk search for 2 deferent log line from 2 deferent sources

bhatganapatik
Loves-to-Learn

Hello Forum

I am facing problem related with 2 lines search 

my logs has information like this

1:  data received 

2: data origin form XXXXX company 

3: data identifier code  is  YYYYY  

4.  data not supported 

 

want  search  XXXXX and YYYYY  (i.e Manufacturer name and data identifier code)  and  get the result in one single query. In our case both information are received in deferent log lines. 

Can someone help us here to get the search string format. 

Thanks in advance. 

Labels (4)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @bhatganapatik,

you should share some additional information to better help you!

In addition:

  • you have two different groups of events to correlate or both fields are in the same event?
  • you want to correlate events from both the sources or only search for a pair of values (e.g. company="company1" and data_identifier_code="12345")?
  • did you already extracted fields? if not you should also share a sample of both sources.
  • is there a common key between the two sources (e.g. data_identifier_code)?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...