<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic help needed to understand correlation search in ES (sandbox) in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/help-needed-to-understand-correlation-search-in-ES-sandbox/m-p/290390#M2530</link>
    <description>&lt;P&gt;I am quite new to ES, although i have an good understanding of data models and other Splunk commands, i am unable to understand the below correlation search in ES.&lt;BR /&gt;
| datamodel "Authentication" "Failed_Authentication" search | stats values(Authentication.tag) as "tag",dc(Authentication.user) as "user_count",dc(Authentication.dest) as "dest_count",count by "Authentication.app","Authentication.src" | rename "Authentication.app" as "app","Authentication.src" as "src" | where 'count'&amp;gt;=6&lt;BR /&gt;
My queries are:&lt;BR /&gt;
1.  datamodel "Authentication" "Failed_Authentication" search - is it searching 2 DMs and what does the search at the end signify. going by the syntax it is not a subsearch that usually starts with "["&lt;BR /&gt;
2. what does  values(Authentication.tag) mean, if Authentication.tag is a field, where can i see the exact field extraction of this field&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 16:50:42 GMT</pubDate>
    <dc:creator>soumyasaha2506</dc:creator>
    <dc:date>2020-09-29T16:50:42Z</dc:date>
    <item>
      <title>help needed to understand correlation search in ES (sandbox)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/help-needed-to-understand-correlation-search-in-ES-sandbox/m-p/290390#M2530</link>
      <description>&lt;P&gt;I am quite new to ES, although i have an good understanding of data models and other Splunk commands, i am unable to understand the below correlation search in ES.&lt;BR /&gt;
| datamodel "Authentication" "Failed_Authentication" search | stats values(Authentication.tag) as "tag",dc(Authentication.user) as "user_count",dc(Authentication.dest) as "dest_count",count by "Authentication.app","Authentication.src" | rename "Authentication.app" as "app","Authentication.src" as "src" | where 'count'&amp;gt;=6&lt;BR /&gt;
My queries are:&lt;BR /&gt;
1.  datamodel "Authentication" "Failed_Authentication" search - is it searching 2 DMs and what does the search at the end signify. going by the syntax it is not a subsearch that usually starts with "["&lt;BR /&gt;
2. what does  values(Authentication.tag) mean, if Authentication.tag is a field, where can i see the exact field extraction of this field&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:50:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/help-needed-to-understand-correlation-search-in-ES-sandbox/m-p/290390#M2530</guid>
      <dc:creator>soumyasaha2506</dc:creator>
      <dc:date>2020-09-29T16:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: help needed to understand correlation search in ES (sandbox)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/help-needed-to-understand-correlation-search-in-ES-sandbox/m-p/290391#M2531</link>
      <description>&lt;P&gt;This is for the excessive failed logins correlation search, correct? This correlation search tutorial actually walks through the syntax of that search, and building it with the guided search editor. &lt;A href="http://docs.splunk.com/Documentation/ES/4.7.4/Tutorials/GuidedCorrelationSearch" target="_blank"&gt;http://docs.splunk.com/Documentation/ES/4.7.4/Tutorials/GuidedCorrelationSearch&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;For your first question, Failed_Authentication is a dataset within the Authentication data model, so it's not searching 2 data models. The Failed_Authentication dataset is identified by the search constraint action=failure. The word search is there because of the way the datamodel command is used: &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Datamodel" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Datamodel&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;For your second question, values(Authentication.tag) looks for all the values of the Authentication.tag field. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Multivaluefunctions#values.28X.29" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Multivaluefunctions#values.28X.29&lt;/A&gt;&lt;BR /&gt;
Authentication.tag is not an extracted field, but the tag field of the Authentication data model. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:51:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/help-needed-to-understand-correlation-search-in-ES-sandbox/m-p/290391#M2531</guid>
      <dc:creator>smoir_splunk</dc:creator>
      <dc:date>2020-09-29T16:51:48Z</dc:date>
    </item>
  </channel>
</rss>

