<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Search to group different fields from different events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543113#M153848</link>
    <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Hi! So ive been at this for hours attempting to use stats and transactions to do this.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I have two events that look like the following: Event 1: (date) (connection=1234) (op=#) (BIND) (username=[username])&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Event 2: (date) (connection=1234) (op=#) (RESULT) (error=49) (INVALID CREDENTIALS)&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I want to create a pivot that has it so that usernames and invalid credentials can be grouped... right now I am doing the stats command, but not getting any results because these (username and error=49) are two different events. Unfortunately, these fields do not contain unique values among each other (same connection# is shared with many other events, same op# is shared with many others)&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;The only thing I can think of is event2 comes directly after event1. Is there a way to group this based on time or perhaps eval?&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Any suggestions?&lt;/P&gt;</description>
    <pubDate>Tue, 09 Mar 2021 21:49:39 GMT</pubDate>
    <dc:creator>johnangelo</dc:creator>
    <dc:date>2021-03-09T21:49:39Z</dc:date>
    <item>
      <title>Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543113#M153848</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Hi! So ive been at this for hours attempting to use stats and transactions to do this.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I have two events that look like the following: Event 1: (date) (connection=1234) (op=#) (BIND) (username=[username])&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Event 2: (date) (connection=1234) (op=#) (RESULT) (error=49) (INVALID CREDENTIALS)&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I want to create a pivot that has it so that usernames and invalid credentials can be grouped... right now I am doing the stats command, but not getting any results because these (username and error=49) are two different events. Unfortunately, these fields do not contain unique values among each other (same connection# is shared with many other events, same op# is shared with many others)&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;The only thing I can think of is event2 comes directly after event1. Is there a way to group this based on time or perhaps eval?&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Any suggestions?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 21:49:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543113#M153848</guid>
      <dc:creator>johnangelo</dc:creator>
      <dc:date>2021-03-09T21:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543145#M153858</link>
      <description>&lt;P&gt;I assume the connection is still important. Try something like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| sort connection _time
| streamstats current=f window=1 values(user) as user by connection&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 07:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543145#M153858</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-10T07:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543240#M153890</link>
      <description>&lt;P&gt;Unfortunately, that did not give me the results I was looking for. For clarity, I am attempting to group userid to failed logins, however, those events are separate from each other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[&lt;/SPAN&gt;&lt;SPAN class="t"&gt;&lt;SPAN class="t h"&gt;10/Mar&lt;/SPAN&gt;/2021:&amp;lt;time&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt;] &lt;/SPAN&gt;&lt;SPAN class="t"&gt;conn=1000&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class="t"&gt;op=1&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class="t"&gt;BIND&lt;/SPAN&gt; &lt;SPAN class="t"&gt;dn=&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class="t"&gt;uid=bobjim&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;cn=users&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;cn=account&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;dc=random&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;dc=com&lt;/SPAN&gt;&lt;SPAN&gt;" &lt;/SPAN&gt;&lt;SPAN class="t"&gt;method=111&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class="t"&gt;version=4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;&lt;SPAN class="t h"&gt;10/Mar/2021:&amp;lt;time&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt;] &lt;/SPAN&gt;conn=1000&amp;nbsp;op=1&amp;nbsp;RESULT err=49 tag=97 nentries=0 etime=0 - Invalid credentials&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 18:34:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543240#M153890</guid>
      <dc:creator>johnangelo</dc:creator>
      <dc:date>2021-03-10T18:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543276#M153897</link>
      <description>&lt;P&gt;What fields are you extracting for the first event? I assumed that the user name has been extracted to a field called field user, but obviously if it has been extracted to a different field, then the streamstats has to be updated accordingly. With this change, do you get the user name on the subsequent event? If not, what do you get?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 23:18:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543276#M153897</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-10T23:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543403#M153925</link>
      <description>&lt;P&gt;Right now I am using&lt;/P&gt;&lt;P&gt;host=&amp;lt;host&amp;gt; sourcetype=&amp;lt;srctype&amp;gt; | sort connection _time&lt;BR /&gt;| streamstats current=f window=1 values(uid) as user by conn&lt;/P&gt;&lt;P&gt;This does return the username, however, I would like the username to be correlated with a failed login attempt and to do a pivot/dashboard on this.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 15:24:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543403#M153925</guid>
      <dc:creator>johnangelo</dc:creator>
      <dc:date>2021-03-11T15:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Search to group different fields from different events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543448#M153933</link>
      <description>&lt;P&gt;Guessing from your example logs, the connection is in field conn(?) so you should sort by this rather than connection?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host=&amp;lt;host&amp;gt; sourcetype=&amp;lt;srctype&amp;gt; | sort conn _time
| streamstats current=f window=1 values(uid) as user by conn&lt;/LI-CODE&gt;&lt;P&gt;This should add the user (uid) to the next record in the pipeline for the connection so the fail message should now have a user (uid) associated with it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 20:15:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-to-group-different-fields-from-different-events/m-p/543448#M153933</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-11T20:15:44Z</dc:date>
    </item>
  </channel>
</rss>

