<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Finding logs which don't yet exist in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20854#M3065</link>
    <description>&lt;P&gt;You were right about the field being called Acct_Session_ID, when I made that change I received some results. But the result was a full listing of all the session ID's that I want to see, but only the session ID's. Ultimately I need a list of the usernames associated with the session_ids on the list. Is that possible?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 13:48:40 GMT</pubDate>
    <dc:creator>sanorthrup</dc:creator>
    <dc:date>2020-09-28T13:48:40Z</dc:date>
    <item>
      <title>Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20846#M3057</link>
      <description>&lt;P&gt;I have radius logs and I'm looking for a way to find out which users have logged in, but not yet logged out. Every VPN session has a start message and a corresponding stop message, both share a unique Session-ID. I'd love to know which users have logged in, but not logged out in the past 24 hours. Is this even possible? &lt;/P&gt;

&lt;P&gt;Apr 29 22:59:13 192.168.6.238 CisACS_03_RADIUSAcc 14ax4k174 1 0 User-Name=domain\user,NAS-IP-Address=192.168.2.197,NAS-Port=134664192,Group-Name=SSL_VPN,Service-Type=Framed,Framed-Protocol=PPP,Calling-Station-Id=108.206.8.210,&lt;STRONG&gt;Acct-Status-Type=Stop&lt;/STRONG&gt;,Acct-Input-Octets=91504,Acct-Output-Octets=863314,&lt;STRONG&gt;Acct-Session-Id=3F0154A4&lt;/STRONG&gt;,Acct-Session-Time=2361,Acct-Input-Packets=1,Acct-Output-Packets=4,&lt;/P&gt;

&lt;P&gt;Apr 29 22:19:52 192.168.6.238 CisACS_03_RADIUSAcc oh7mmpl 1 0 User-Name=domain\user,NAS-IP-Address=192.168.2.197,NAS-Port=134664192,Group-Name=SSL_VPN,Service-Type=Framed,Framed-Protocol=PPP,Calling-Station-Id=108.206.8.210,&lt;STRONG&gt;Acct-Status-Type=Start&lt;/STRONG&gt;,&lt;STRONG&gt;Acct-Session-Id=3F0154A4&lt;/STRONG&gt;,&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:48:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20846#M3057</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2020-09-28T13:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20847#M3058</link>
      <description>&lt;P&gt;Are these two events the only ones you ever get, so that you only ever expect two events per Acct-Session-Id? In that case, you could do&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats count by Acct-Session-Id | where count&amp;lt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to find session ID's where only one event occurred.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 20:24:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20847#M3058</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-04-30T20:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20848#M3059</link>
      <description>&lt;P&gt;Unfortunately there will be thousands of logs. Many of them will have both start messages and corresponding stops. I only want to see the ones which have a start, but no stop.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 21:51:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20848#M3059</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2013-04-30T21:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20849#M3060</link>
      <description>&lt;P&gt;Yes, that's what I'm trying to address in my answer. My question was if there are two events per VALID SESSION or if there are more.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 21:56:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20849#M3060</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-04-30T21:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20850#M3061</link>
      <description>&lt;P&gt;Sorry, for every unique Acct-Session-Id=xxx123 there will never be more than 2 events. They are Acct-Status-Type=Start and Acct-Status-Type=Stop.&lt;BR /&gt;
I see what you're trying to do in your query and it looks like exactly what I need, but unfortunately it's got 7,000+ events, but 0 results whether I include "| where count&amp;lt;2" or not. &lt;BR /&gt;
Here's my query:&lt;BR /&gt;
sourcetype="ssl_vpn" | stats count by Acct-Session-Id | where count&amp;lt;2&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 22:33:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20850#M3061</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2013-04-30T22:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20851#M3062</link>
      <description>&lt;P&gt;What type of output do you get when you search for;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype=ssl_vpn | stats count by Acct-Session-Id&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;What are the counts?&lt;BR /&gt;
Is the &lt;EM&gt;field&lt;/EM&gt; called &lt;CODE&gt;Acct-Session-Id&lt;/CODE&gt;? Or is it just the text in the event that looks like that?&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 23:28:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20851#M3062</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-04-30T23:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20852#M3063</link>
      <description>&lt;P&gt;For a 24 hour period I get 7,394 "matching events" but 0 results. I don't think Acct-Session-ID is actually a field, I think it's just text in the event. Can I/Should I make it a field? Would that help?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2013 23:47:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20852#M3063</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2013-04-30T23:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20853#M3064</link>
      <description>&lt;P&gt;Yes. That would help. But are you sure that it's not a field under a different name, like &lt;CODE&gt;Acct_Session_Id&lt;/CODE&gt;? Check the field list to the left of the events listing.&lt;/P&gt;

&lt;P&gt;Also, I think that you should check that you run in 'Smart' or 'Verbose' mode. Just above the time-picker/search button.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 00:01:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20853#M3064</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T00:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20854#M3065</link>
      <description>&lt;P&gt;You were right about the field being called Acct_Session_ID, when I made that change I received some results. But the result was a full listing of all the session ID's that I want to see, but only the session ID's. Ultimately I need a list of the usernames associated with the session_ids on the list. Is that possible?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:48:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20854#M3065</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2020-09-28T13:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20855#M3066</link>
      <description>&lt;P&gt;There is a line in your event that says &lt;CODE&gt;User-Name&lt;/CODE&gt;, possibly you have a field called &lt;CODE&gt;User_Name&lt;/CODE&gt;? Currently that field has values like &lt;CODE&gt;domainuser&lt;/CODE&gt;, but perhaps that is your editing/masking of real user-ids?&lt;/P&gt;

&lt;P&gt;Then you can craft searches like;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;... | stats count first(User_Name) as User by Acct_Session_Id | where count&amp;lt;2&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;There can only be one username for each session, right, so therefore you can use the &lt;CODE&gt;first()&lt;/CODE&gt; function to &lt;CODE&gt;stats&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 08:33:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20855#M3066</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T08:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20856#M3067</link>
      <description>&lt;P&gt;You are correct about only having one username for each session. To make matters more complicated, I also need to see the date, time (ideally I could see the entire message) and I need to filter so that I'm only seeing the messages which have "Acct-Status-Type=Start". Otherwise I see users/sessions that logged in yesterday, but logged out today.  Is it possible to see the messages in their original format rather than just a column of session ID's/usernames?&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 11:31:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20856#M3067</guid>
      <dc:creator>sanorthrup</dc:creator>
      <dc:date>2013-05-01T11:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20857#M3068</link>
      <description>&lt;P&gt;You could try a subsearch;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;source=your_source Acct_Status_Type = Start NOT [search source=your source Acct_Status_Type = Stop | fields + Acct_Session_Id]&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The inner search (in square brackets) will return the session id's for all Stop events, so that the outer search will look for all Start events, but not those that have a corresponding Stop event.&lt;/P&gt;

&lt;P&gt;Read up on subsearches in the docs.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 13:24:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20857#M3068</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T13:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs which don't yet exist</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20858#M3069</link>
      <description>&lt;P&gt;when you get more up to speed, you could have look at this blog post. most useful in your type of case (since you dont know just how far back to look for those Start messages):&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/"&gt;http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2013 17:52:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Finding-logs-which-don-t-yet-exist/m-p/20858#M3069</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-05-01T17:52:04Z</dc:date>
    </item>
  </channel>
</rss>

