<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identifying an asset over multiple sourcetype events in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127160#M26162</link>
    <description>&lt;P&gt;Either do a join or try map search -&lt;/P&gt;

&lt;P&gt;1) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time 1 | join IP [ search index=idx2 sourcetype=sourcetype2 | table _time IP | rename _time as time2  ] | eval diff=abs(time1 - time2) | search diff &amp;lt; 3600&lt;/P&gt;

&lt;P&gt;2) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time1 | map search=" index=idx2 sourcetype=sourcetype2 IP=$IP$  | table _time IP | rename _time as time2 | eval diff=abs($time1$ - time2) | search diff &amp;lt; 3600 "&lt;/P&gt;</description>
    <pubDate>Tue, 26 May 2015 05:18:41 GMT</pubDate>
    <dc:creator>dineshraj9</dc:creator>
    <dc:date>2015-05-26T05:18:41Z</dc:date>
    <item>
      <title>Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127159#M26161</link>
      <description>&lt;P&gt;Hi Splunk Answers,&lt;BR /&gt;
First post here, go easy on me!&lt;BR /&gt;
We're running Splunk ES and I would like to create a correlation search. The criteria is:&lt;BR /&gt;
If an IDS event is received for an internal IP (I could specify a range of required) (first sourcetype) and that same IP has recieved a malware alert within an hour of the IDS event (second sourcetype), then create a notable event.&lt;/P&gt;

&lt;P&gt;Any clues as to what my syntax would be for this?&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 02:46:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127159#M26161</guid>
      <dc:creator>shiftey</dc:creator>
      <dc:date>2015-05-26T02:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127160#M26162</link>
      <description>&lt;P&gt;Either do a join or try map search -&lt;/P&gt;

&lt;P&gt;1) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time 1 | join IP [ search index=idx2 sourcetype=sourcetype2 | table _time IP | rename _time as time2  ] | eval diff=abs(time1 - time2) | search diff &amp;lt; 3600&lt;/P&gt;

&lt;P&gt;2) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time1 | map search=" index=idx2 sourcetype=sourcetype2 IP=$IP$  | table _time IP | rename _time as time2 | eval diff=abs($time1$ - time2) | search diff &amp;lt; 3600 "&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 05:18:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127160#M26162</guid>
      <dc:creator>dineshraj9</dc:creator>
      <dc:date>2015-05-26T05:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127161#M26163</link>
      <description>&lt;P&gt;Thanks for your response dineshraj9&lt;/P&gt;

&lt;P&gt;In my case I dont have a "_time" field.&lt;BR /&gt;
Time is broken down with the fields below, with example values&lt;BR /&gt;
How can I eval time while considering the date also?&lt;/P&gt;

&lt;P&gt;date_hour = 15&lt;BR /&gt;
date_mday = 25&lt;BR /&gt;
date_minute = 36&lt;BR /&gt;
date_month = may&lt;BR /&gt;
date_second = 28&lt;BR /&gt;
date_wday = monday&lt;BR /&gt;
date_year = 2015&lt;BR /&gt;
date_zone = 0&lt;BR /&gt;
timestartpos = 24&lt;BR /&gt;
timeendpos = 0&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:03:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127161#M26163</guid>
      <dc:creator>shiftey</dc:creator>
      <dc:date>2020-09-28T20:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127162#M26164</link>
      <description>&lt;P&gt;_time is an internal field and it won't show up on the left. _time would in epoch form. So at the end just process the time1 and time2 fields.&lt;/P&gt;

&lt;P&gt;1) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time 1 | join IP [ search index=idx2 sourcetype=sourcetype2 | table _time IP | rename _time as time2 ] | eval diff=abs(time1 - time2) | search diff &amp;lt; 3600 | convert ctime(time1) as time1 | convert ctime(time1) as time2&lt;/P&gt;

&lt;P&gt;2) index=idx1 sourcetype=sourcetype1 | table _time IP | rename _time as time1 | map search=" index=idx2 sourcetype=sourcetype2 IP=$IP$ | table _time IP | rename _time as time2 | eval diff=abs($time1$ - time2) | search diff &amp;lt; 3600 " | convert ctime(time1) as time1 | convert ctime(time1) as time2&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 10:01:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127162#M26164</guid>
      <dc:creator>dineshraj9</dc:creator>
      <dc:date>2015-05-26T10:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127163#M26165</link>
      <description>&lt;P&gt;Thanks for that,&lt;/P&gt;

&lt;P&gt;I am seeing results, what I am seeing is table headers:&lt;/P&gt;

&lt;P&gt;time1   IP   diff  time2&lt;/P&gt;

&lt;P&gt;time1 appears to show date and time for first sourcetype event and ip shows ip. time2 field is blank and diff shows a value which I think is in seconds? How would I show the associated event description with each sourcetype, just a case of adding to the table?&lt;/P&gt;

&lt;P&gt;eg. sourcetype1=ids, sourcetype2=malware, how could I see the associated event description of each source type..&lt;/P&gt;

&lt;P&gt;Hope that makes sense &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 23:54:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127163#M26165</guid>
      <dc:creator>shiftey</dc:creator>
      <dc:date>2015-05-26T23:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127164#M26166</link>
      <description>&lt;P&gt;Hi @shiftey and @dineshraj9&lt;/P&gt;

&lt;P&gt;Please be sure that when responding to someone's answer, click on "Add comment" directly below their answer or, if responding to someone's comment, type in the "Add your comment..." box directly below their comment. You typed your responses to each other in the "Enter your answer here..." box at the very bottom of the page which, instead, posts a brand new answer when it was really meant as a comment. This will help with a clean continuous flow of the conversation. I already converted your "answers" to a comments appropriately, so just something to keep in mind from here on out. Thanks and happy Splunking!&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2015 00:42:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127164#M26166</guid>
      <dc:creator>ppablo</dc:creator>
      <dc:date>2015-05-27T00:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying an asset over multiple sourcetype events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127165#M26167</link>
      <description>&lt;P&gt;My Apologies.. there was typo in my previous post. It should be | convert ctime(time2) as time2(had given time1)&lt;/P&gt;

&lt;P&gt;Use the _raw field to show the entire event. You can also give any other extracted fields from the events.&lt;/P&gt;

&lt;P&gt;1) index=idx1 sourcetype=sourcetype1 | table _time IP _raw | rename _time as time 1,_raw as event1 | join IP [ search index=idx2 sourcetype=sourcetype2 | table _time IP _raw | rename _time as time2,_raw as event2 ] | eval diff=abs(time1 - time2) | search diff &amp;lt; 3600 | convert ctime(time1) as time1 | convert ctime(time2) as time2&lt;/P&gt;

&lt;P&gt;2) index=idx1 sourcetype=sourcetype1 | table _time IP _raw | rename _time as time1,_raw as event1 | map search=" index=idx2 sourcetype=sourcetype2 IP=$IP$ | table _time IP _raw | rename _time as time2,_raw as event2 | eval diff=abs($time1$ - time2) | search diff &amp;lt; 3600 " | convert ctime(time1) as time1 | convert ctime(time2) as time2&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:03:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Identifying-an-asset-over-multiple-sourcetype-events/m-p/127165#M26167</guid>
      <dc:creator>dineshraj9</dc:creator>
      <dc:date>2020-09-28T20:03:21Z</dc:date>
    </item>
  </channel>
</rss>

