<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to correlate an event using two different indexes? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532395#M150400</link>
    <description>&lt;P&gt;The first index contains data from an endpoint security tool that can block outbound/external emails. The second index contains data from another endpoint tool that archives emails (I can see all successful outbound and inbound emails that are not blocked).&lt;/P&gt;&lt;P&gt;So essentially, I want to see if user ABC123 gets two email blocks and within 30 minutes of those two blocks (index1), sends a successful email that is not blocked (index2).&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Dec 2020 21:09:35 GMT</pubDate>
    <dc:creator>bcjammer03</dc:creator>
    <dc:date>2020-12-08T21:09:35Z</dc:date>
    <item>
      <title>How to correlate an event using two different indexes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532391#M150396</link>
      <description>&lt;P&gt;I'm trying to create a query that will provide me with events that use two indexes. The results are to show events where 2 consecutive emails were blocked (by a specific endpoint tool = index1) followed by a successfully sent email (logged by another endpoint tool = index2).&amp;nbsp;&lt;/P&gt;&lt;P&gt;event/log=((block#1and block#2) and successful sent email)&lt;/P&gt;&lt;P&gt;I've been running into issues-this what I currently have:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;index=&lt;STRONG&gt;index1&lt;/STRONG&gt; field1=SMTP action=blocked&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| rex field=suid&amp;nbsp; "(?&amp;lt;UserName&amp;gt;.+?)@"&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| eval UserName=upper(UserName)&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| rex "fileName"=(?&amp;lt;attachments&amp;gt;.+)\s*fileHash=*+"&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| rex field=_raw "(?Subject&amp;gt;(?&amp;lt;=cs\=)(.*)(?=suid\=))"&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| rename suid AS Sender act as ACT&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| stats count by UserName&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;| transaction endswith=datasource="&lt;STRONG&gt;index2&lt;/STRONG&gt;" maxspan=30min&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated, thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 20:42:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532391#M150396</guid>
      <dc:creator>bcjammer03</dc:creator>
      <dc:date>2020-12-08T20:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate an event using two different indexes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532394#M150399</link>
      <description>&lt;P&gt;Can you explain more about what you want? What I understood is:&lt;BR /&gt;&lt;BR /&gt;The first index have the initial information, like email, user ID, and so on,&lt;BR /&gt;The second one is the information related to event stats like blocks, success, etc.&lt;BR /&gt;&lt;BR /&gt;Is that right?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 20:58:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532394#M150399</guid>
      <dc:creator>rafamss</dc:creator>
      <dc:date>2020-12-08T20:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate an event using two different indexes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532395#M150400</link>
      <description>&lt;P&gt;The first index contains data from an endpoint security tool that can block outbound/external emails. The second index contains data from another endpoint tool that archives emails (I can see all successful outbound and inbound emails that are not blocked).&lt;/P&gt;&lt;P&gt;So essentially, I want to see if user ABC123 gets two email blocks and within 30 minutes of those two blocks (index1), sends a successful email that is not blocked (index2).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 21:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-an-event-using-two-different-indexes/m-p/532395#M150400</guid>
      <dc:creator>bcjammer03</dc:creator>
      <dc:date>2020-12-08T21:09:35Z</dc:date>
    </item>
  </channel>
</rss>

