Splunk Search

Tips on Formulating a query, where I have known text's from two different log lines

somnath_tm
New Member

A splunk novice question
We have logs and the example is something like this
2016-05-05T09:05:50.610050-07:00 Correlation-Id="XYZ" category="" request body :{}

2016-05-05T09:05:51.610050-07:00 Correlation-Id="XYZ" category="" response body :{}

I want to query in such a way that I am looking for a specific text in response body (that would be something like index=abc host=myserver "ERROR") as well the request body. So that I get a consolidated list of all the correlation-Ids which I can use.

Please NOTE: The request and response are in two different log lines

Is such query possible ?

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Find specific text is as simple as putting the desired text in quotes.

index=foo "bar"

will find all instance of "bar" in any event in the "foo" index.

To narrow it down to events containing either "request body" or "response body":

index=foo "bar" ("request body" OR "response body")
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | What’s a riddle wrapped in an enigma?

September 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

BORE at .conf25

Boss Of Regular Expression (BORE) was an interactive session run again this year at .conf25 by the brilliant ...

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...