<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event correlation in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523810#M147774</link>
    <description>&lt;P&gt;You could try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;search index=abc123 NOT (Operation=EventTriggered) [
  search index=abc123 Operation=EventTriggered
  | spath input=Data
  | eval GUID=reid
  | fields GUID ]
|rename "Parameters{}.Name" AS paramsName "Parameters{}.Value" AS paramsValue
|eval params=mvzip(paramsName,paramsValue)
|table myfields&lt;/LI-CODE&gt;</description>
    <pubDate>Thu, 08 Oct 2020 20:15:31 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2020-10-08T20:15:31Z</dc:date>
    <item>
      <title>Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523558#M147657</link>
      <description>&lt;P&gt;There's been numerous other questions that I've read through to see if a similar situation has been asked but so far (from what I've gathered) they've not matched my situation, so I figure I'd ask here.&lt;BR /&gt;&lt;BR /&gt;My goal is to create an alert.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=abc123 Operation=EventTriggered
|spath input=Data
|fields reid&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;This will give me reid (relative ID). In the same index (abc123) there's events that have a unique ID (the field name is GUID). So, using the above search's reid value, I want to take that value and search for it in GUID and return events. So, if reid=xyz, I want something along the lines of:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=abc123 GUID=xyz NOT (Operation=EventTriggered)
|rename "Parameters{}.Name" AS paramsName "Parameters{}.Value" AS paramsValue
|eval params=mvzip(paramsName,paramsValue)
|table myfields&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;The issue is that I don't know which value of GUID to search for until I run the first search, and the field values that I care about and want to table are generated from my second search.&lt;BR /&gt;&lt;BR /&gt;My question, is, what is a good way to approach this? I don't think I can use a join since reid and GUID are different field names. In the result set of the first search I can't rename reid to GUID because the event with the recorded reid has its own GUID value. Although I can probably do some multivalue field manipulation to overcome that issue?&lt;BR /&gt;&lt;BR /&gt;Could I use a subsearch somehow? Maybe in the subsearch, get the value of reid and pass it in that way?&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 00:03:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523558#M147657</guid>
      <dc:creator>Shuzzillay</dc:creator>
      <dc:date>2020-10-08T00:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523566#M147662</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;gt; The issue is that I don't know which value of GUID to search for until I run the first search, and the field values that I care about and want to table are generated from my second search.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227286"&gt;@Shuzzillay&lt;/a&gt;&amp;nbsp;.. so, after running the first search for reid, how you will know which value of GUID to search? i mean, you will manually select the GUID or any calculations like top reid will be my GUID, etc.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 01:53:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523566#M147662</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2020-10-08T01:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523634#M147697</link>
      <description>&lt;P&gt;I am not sure why you can't use join. Just overwrite the GUID from the first search with the reid. You don't need the GUID from the first search since you are effectively excluding it with NOT (Operation=EventTriggered).&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=abc123 Operation=EventTriggered
| spath input=Data
| eval GUID=reid
| fields GUID
| join GUID [
search index=abc123 NOT (Operation=EventTriggered)
|rename "Parameters{}.Name" AS paramsName "Parameters{}.Value" AS paramsValue
|eval params=mvzip(paramsName,paramsValue)
]
|table myfields&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 08 Oct 2020 09:42:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523634#M147697</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-08T09:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523801#M147766</link>
      <description>&lt;P&gt;You are right, and this does work (so thanks!)&lt;BR /&gt;&lt;BR /&gt;I wonder if there's a way to go about it without a join, but this seems like an ideal scenario for using a join.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:42:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523801#M147766</guid>
      <dc:creator>Shuzzillay</dc:creator>
      <dc:date>2020-10-08T19:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523803#M147768</link>
      <description>&lt;P&gt;It won't be manual as my goal is to write an alert. I was thinking just using `fields` or any other calculation.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:44:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523803#M147768</guid>
      <dc:creator>Shuzzillay</dc:creator>
      <dc:date>2020-10-08T19:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Event correlation</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523810#M147774</link>
      <description>&lt;P&gt;You could try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;search index=abc123 NOT (Operation=EventTriggered) [
  search index=abc123 Operation=EventTriggered
  | spath input=Data
  | eval GUID=reid
  | fields GUID ]
|rename "Parameters{}.Name" AS paramsName "Parameters{}.Value" AS paramsValue
|eval params=mvzip(paramsName,paramsValue)
|table myfields&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 08 Oct 2020 20:15:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-correlation/m-p/523810#M147774</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-08T20:15:31Z</dc:date>
    </item>
  </channel>
</rss>

