Splunk Search

Splunk to verify splunk query results

bsaujla131984
Path Finder

I have created an alert which basically checks the occurrence in particular keyword in two log files , however there is a difference of time from anywhere between 1 min to 1 hours for that keyword to appear in both log files.

Example:-

If keywork CorrID appears in Log File A, then it can appear in Log File B between anywhere from 1min to 1 hour.... So our search first checks in Log File A and then wait for an hour to check in Log File B.

Problem is when keyword does not appear in Log File B for more than 1 hour, then we get an alert, which is false, because keyword had appeared up in Log File B after 70 minutes.

So now, I want to run a search which verifies the output again in last two hours in both log files..?

Tags (1)
0 Karma

arjunpkishore5
Motivator

You can use a subquery to filter the second log based on the first. It'll be easier to explain if can you post sample searches for both searches.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...