Splunk Search

Linking outbound and inbound messages, then finding incomplete ones

wardallen
Path Finder

I am analysing a logfile where there'll be a message that describes an outbound message going to an external system, and a short period of time later, a reciprocal message from the external system - a "job done" message, containing a unique deal ID common to both.
Finding the out and in messages won't be hard.
The hard part will be writing a query that tells me about all deal IDs that have an outbound but not an inbound component. What would be the best approach to do this?

Tags (1)
0 Karma
1 Solution

kristian_kolb
Ultra Champion

I can think of at least the following (where deal_ID would be the field that contains the ... deal ID);

... | transaction deal_ID | where eventcount < 2

and slightly faster:

... | stats count by deal_ID | where count < 2

/K

View solution in original post

kristian_kolb
Ultra Champion

I can think of at least the following (where deal_ID would be the field that contains the ... deal ID);

... | transaction deal_ID | where eventcount < 2

and slightly faster:

... | stats count by deal_ID | where count < 2

/K

kristian_kolb
Ultra Champion

The first search will return the whole outbound event, and the second search will just return the deal_ID of the lonely outbound event.

/k

wardallen
Path Finder

Also, there will be other pairs starting/finishing at the same time. Processing is not linear.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...