Splunk Search

Splunk search for 2 deferent log line from 2 deferent sources

bhatganapatik
Loves-to-Learn

Hello Forum

I am facing problem related with 2 lines search 

my logs has information like this

1:  data received 

2: data origin form XXXXX company 

3: data identifier code  is  YYYYY  

4.  data not supported 

 

want  search  XXXXX and YYYYY  (i.e Manufacturer name and data identifier code)  and  get the result in one single query. In our case both information are received in deferent log lines. 

Can someone help us here to get the search string format. 

Thanks in advance. 

Labels (4)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @bhatganapatik,

you should share some additional information to better help you!

In addition:

  • you have two different groups of events to correlate or both fields are in the same event?
  • you want to correlate events from both the sources or only search for a pair of values (e.g. company="company1" and data_identifier_code="12345")?
  • did you already extracted fields? if not you should also share a sample of both sources.
  • is there a common key between the two sources (e.g. data_identifier_code)?

Ciao.

Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...