<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Correlate data with transaction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44692#M10551</link>
    <description>&lt;P&gt;You can also do something like this to get the IP into a single field from both event types if it works better for you:&lt;BR /&gt;
&lt;CODE&gt;... | eval ip=case(eventtype="cisco",dest_ip,eventtype="ip_watch",offending_ip) | chart c(eval(eventtype="cisco")) as number_of_cisco_events c(eval(eventtype="ip_watchlist")) as number_of_watchlist_events over day by IP&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2013 09:13:44 GMT</pubDate>
    <dc:creator>brettcave</dc:creator>
    <dc:date>2013-08-26T09:13:44Z</dc:date>
    <item>
      <title>Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44685#M10544</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying correlate data from ip watchlist app and events of firewall.&lt;/P&gt;

&lt;P&gt;the search: (index=test sourcetype=cisco_asa teardown) OR (index=test sourcetype=ip_watchlist)|transaction dest_ip,offending_ip maxspan=1d connected=f eval count_sourcetypes=mvcount(sourcetype)|where count_sourcetypes&amp;gt;1&lt;/P&gt;

&lt;P&gt;but isn´t working.&lt;/P&gt;

&lt;P&gt;any idea?&lt;/P&gt;

&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:38:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44685#M10544</guid>
      <dc:creator>fahrenheit</dc:creator>
      <dc:date>2020-09-28T14:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44686#M10545</link>
      <description>&lt;P&gt;"Isn't working" isn't very helpful. Please tell us more about the exact results, and what troubleshooting process you have gone through.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2013 10:50:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44686#M10545</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-08-23T10:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44687#M10546</link>
      <description>&lt;P&gt;the results&lt;/P&gt;

&lt;P&gt;Aug 23 13:03:05 %ASA-6-302014: Teardown TCP connection 924351437 for Inside:x.x.x.x/1081 to Internet:112.106.156.81/80 duration 0:00:30 bytes 0 SYN Timeout &lt;BR /&gt;
vie ago 23 13:03:26 CEST 2013 splunk-host=splunk offending-ip=61.191.188.70 &lt;BR /&gt;
Aug 23 13:03:26 10.1.233.1 %ASA-6-302014: Teardown TCP connection 924355686 for Inside:x.x.x.x/1084 to Internet:112.106.156.81/80 duration 0:00:30 bytes 0 SYN Timeouthost=x.x.x.x Options| &lt;BR /&gt;
host=SPLUNK Options| &lt;BR /&gt;
sourcetype=ciscoasa Options| &lt;BR /&gt;
sourcetype=ipwatchlist Options| &lt;BR /&gt;
source=/opt/splunk/etc/apps/splunkipwatchlist/bin/getbadip.sh &lt;/P&gt;

&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2013 11:10:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44687#M10546</guid>
      <dc:creator>fahrenheit</dc:creator>
      <dc:date>2013-08-23T11:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44688#M10547</link>
      <description>&lt;P&gt;I find using &lt;CODE&gt;stats&lt;/CODE&gt; is a much better method for correlating data based on common fields. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;stats list(some_field) AS all_values values(other_field) AS distinct_values by transaction_field
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can then pipe to things like mvexpand or eval's with multivalue functions to extract / count the data.&lt;/P&gt;

&lt;P&gt;hth&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2013 11:25:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44688#M10547</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-23T11:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44689#M10548</link>
      <description>&lt;P&gt;Hi brettcave,&lt;/P&gt;

&lt;P&gt;I don´t know how do it, can you put an example?&lt;/P&gt;

&lt;P&gt;thanks &lt;/P&gt;

&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2013 07:13:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44689#M10548</guid>
      <dc:creator>fahrenheit</dc:creator>
      <dc:date>2013-08-26T07:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44690#M10549</link>
      <description>&lt;P&gt;OK, but you haven't shown us what's wrong with these results, ie what results you really were expecting and why.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2013 07:23:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44690#M10549</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-08-26T07:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44691#M10550</link>
      <description>&lt;P&gt;(index=test sourcetype=cisco_asa teardown) OR (index=test sourcetype=ip_watchlist) | eval day=strftime(_time,"%F") | chart c as number_of_events list(offending_ip) as offending_ips over day by dest_ip&lt;/P&gt;

&lt;P&gt;use &lt;CODE&gt;chart &amp;lt;aggr_func&amp;gt; over &amp;lt;field-x&amp;gt; by &amp;lt;field-y&amp;gt;&lt;/CODE&gt;, or &lt;CODE&gt;stats &amp;lt;aggr_func&amp;gt; by &amp;lt;field-x&amp;gt;,&amp;lt;field-y&amp;gt;&lt;/CODE&gt;. Chart also supports the &lt;CODE&gt;span&lt;/CODE&gt; parameter if you don't want to manually set the day using eval like I did - play around with it to get the exact results you are looking for.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44691#M10550</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2020-09-28T14:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44692#M10551</link>
      <description>&lt;P&gt;You can also do something like this to get the IP into a single field from both event types if it works better for you:&lt;BR /&gt;
&lt;CODE&gt;... | eval ip=case(eventtype="cisco",dest_ip,eventtype="ip_watch",offending_ip) | chart c(eval(eventtype="cisco")) as number_of_cisco_events c(eval(eventtype="ip_watchlist")) as number_of_watchlist_events over day by IP&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2013 09:13:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44692#M10551</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-26T09:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44693#M10552</link>
      <description>&lt;P&gt;thanks, i will try&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2013 12:47:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44693#M10552</guid>
      <dc:creator>fahrenheit</dc:creator>
      <dc:date>2013-08-26T12:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: Correlate data with transaction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44694#M10553</link>
      <description>&lt;P&gt;thanks brettcave,&lt;/P&gt;

&lt;P&gt;I will try and inform you&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2013 11:12:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Correlate-data-with-transaction/m-p/44694#M10553</guid>
      <dc:creator>fahrenheit</dc:creator>
      <dc:date>2013-08-29T11:12:35Z</dc:date>
    </item>
  </channel>
</rss>

