Splunk Search

Form a single statistics from two different sources on common parameters

harshal_chakran
Builder

Hi,
I am using two different sources, for e.g.source1 and source2, which contains different numeric error on same timestamps.
for e.g.

Source1: 03:43:15.780 errorvalue=202

Source2: 03:43:15.780 errorvalue=222

I want to get the statistics as a combination of both the sources where the Timestamp is a common column, second column containing the error string from source1, third column containing error string from source2 and third giving match or no match clause.

such as

Time Stamp source1 source2 match

03:43:15.780 202 222 yes

Please help

0 Karma

wpreston
Motivator

I'll make a couple of assumptions:

  1. The errorvalue field has the same name in both sources
  2. The match or no match clause means you want to know if the errorvalue from source1 matches the errorvalue from source2

If these are both correct, try a search like the following:

source=source1 source=source2 errorvalue=* | eval source1=if(source=source1,errorvalue,null()) | eval source2=if(source=source2,errorvalue,null()) | stats count by _time source1 source2 | eval match=if(source1=source2,"yes","no") | fields - count

I'm sure there is a more elegant way of writing this search, but this should do what you want.

0 Karma

Ayn
Legend

What do you mean by "match or no match"? What rule is there for this?

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...