<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event correlation in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521755#M147040</link>
    <description>&lt;P&gt;Hello Thank you to answer,&lt;/P&gt;&lt;P&gt;Yes I can find event with this field but the username isn't in the same event. The only same value that I can find in all event is the session id field&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 10:36:28 GMT</pubDate>
    <dc:creator>miguel1423</dc:creator>
    <dc:date>2020-09-28T10:36:28Z</dc:date>
    <item>
      <title>Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521743#M147034</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to display some VPN informations in splunk like username, host information, session id. My problem is that I cannot display username and host information in the same table, the user field doesn't exist??&lt;/P&gt;&lt;P&gt;below the search that I did.&lt;/P&gt;&lt;P&gt;I search for user with specifique application use and I try to catch the username, session_id and client_info_host but I get nothing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXXXXX:Common" | stats count by user session_id client_info_host | table session_id user client_info_host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I remove the field "client_info_host" I get the result below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXX:Common" | stats count by user session_id | table session_id user client_info_host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="miguel1423_0-1601283625714.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11006iECC45A45BB1FFF1C/image-size/large?v=v2&amp;amp;px=999" role="button" title="miguel1423_0-1601283625714.png" alt="miguel1423_0-1601283625714.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I filter only with the field "client_info_host" I don't get the value username on the filed with this event.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="miguel1423_2-1601284048156.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11008i1BC0053CCF30C510/image-size/medium?v=v2&amp;amp;px=400" role="button" title="miguel1423_2-1601284048156.png" alt="miguel1423_2-1601284048156.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for all events the commune value is the session_id, How can I collerate all fields from session_id ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:14:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521743#M147034</guid>
      <dc:creator>miguel1423</dc:creator>
      <dc:date>2020-09-28T09:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521748#M147036</link>
      <description>&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXXXXX:Common" | stats count values(client_info_host) as client_info_host by user session_id | table session_id user client_info_host&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:33:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521748#M147036</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-28T09:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521749#M147037</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52681"&gt;@miguel1423&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;after a stats command you have only the fields in the stats, in your first case: user, session_id, client_info_host.&lt;/P&gt;&lt;P&gt;In the second and third example you don't use some fields in the BY clause, for this reason you don't have in the following table.&lt;/P&gt;&lt;P&gt;If you want them, you have to put them in the stats command, e.g. using values option, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXX:Common" 
| stats values(client_info_host) AS client_info_host count by user session_id
| table session_id user client_info_host&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:34:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521749#M147037</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-28T09:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521753#M147038</link>
      <description>&lt;P&gt;Hello thank you for your reply,&lt;/P&gt;&lt;P&gt;I tried your suggestion but I get the username and session id but not the client_info host &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":loudly_crying_face:"&gt;😭&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="miguel1423_0-1601288850564.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11009iF57271D0F3DF2176/image-size/large?v=v2&amp;amp;px=999" role="button" title="miguel1423_0-1601288850564.png" alt="miguel1423_0-1601288850564.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S: The&amp;nbsp; client_info host data is not in the same event that the username, but the session id is in all events.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:33:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521753#M147038</guid>
      <dc:creator>miguel1423</dc:creator>
      <dc:date>2020-09-28T10:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521754#M147039</link>
      <description>&lt;P&gt;It looks like client_info_host hasn't been extracted. Can you find an event with this field? Does it also have the user &lt;U&gt;and&lt;/U&gt; session id field?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXXXXX:Common" | stats count values(client_info_host) as client_info_host values(user) as user by session_id | table session_id user client_info_host&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:34:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521754#M147039</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-28T10:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521755#M147040</link>
      <description>&lt;P&gt;Hello Thank you to answer,&lt;/P&gt;&lt;P&gt;Yes I can find event with this field but the username isn't in the same event. The only same value that I can find in all event is the session id field&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:36:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521755#M147040</guid>
      <dc:creator>miguel1423</dc:creator>
      <dc:date>2020-09-28T10:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521757#M147041</link>
      <description>&lt;P&gt;So did you try the query I posted?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXXXXX:Common" 
| stats count values(client_info_host) as client_info_host values(user) as user by session_id 
| table session_id user client_info_host&lt;/LI-CODE&gt;&lt;P&gt;This stats should "join" these events by session_id giving you the values of client_info_host and user for each session_id&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:40:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521757#M147041</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-28T10:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521758#M147042</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Cool, yes it's work thank you&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; if I want tu show the connexion time Do I need tu insert the field "_time" after the "by session_id" ? and in the table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:56:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521758#M147042</guid>
      <dc:creator>miguel1423</dc:creator>
      <dc:date>2020-09-28T10:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521760#M147044</link>
      <description>&lt;P&gt;No, but you could add earliest(_time) as session_start&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_X" partition="/Common/XXXXXXXXXXXX:Common" 
| stats count values(client_info_host) as client_info_host values(user) as user earliest(_time) as session_start by session_id 
| table session_id user client_info_host session_start&lt;/LI-CODE&gt;&lt;P&gt;If you do something similar with latest(_time) as session_end you could calculate the duration of the session, if that is what you are after&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:05:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521760#M147044</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-28T11:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521769#M147048</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/52681"&gt;@miguel1423&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;sorry I didn't see that there's a space between "client_info" and "host": are you meaning two fields or one field with space between?&lt;/P&gt;&lt;P&gt;Anyway, the approach is the one I described:&lt;/P&gt;&lt;P&gt;use values(field) AS field for all the fields that you haven't in BY clause and you want in table.&lt;/P&gt;&lt;P&gt;Beware to correctly write the field names (they are case sensistive).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521769#M147048</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-28T11:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521794#M147062</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a last request, now I'm going to try to get a specific message_id and his value "message"&lt;/P&gt;&lt;P&gt;I added the value in the stats count value as below but I get all message and message ID I can't sort by message id with the field "where" Do you have any idea about that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="index_XX" partition="/Common/XXXXXXXX:Common" 
| stats count values(client_info_host) as client_info_host values(user) as user values(message) as message values(message_id) as message_id  by session_id 
| dedup user
| where message_id="0505" 
| table session_id user client_info_host message_id message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="miguel1423_0-1601299790594.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11011iD49AF878EA2BB62F/image-size/large?v=v2&amp;amp;px=999" role="button" title="miguel1423_0-1601299790594.png" alt="miguel1423_0-1601299790594.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/521794#M147062</guid>
      <dc:creator>miguel1423</dc:creator>
      <dc:date>2020-09-28T13:30:00Z</dc:date>
    </item>
  </channel>
</rss>

