<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368845#M163063</link>
    <description>&lt;P&gt;Here you go, below is the &lt;/P&gt;

&lt;P&gt;{"bdy":{"msg":"&lt;STRONG&gt;AuthenticationPage loaded&lt;/STRONG&gt;.","metricName":"PageLoad","metricValue":"AuthenticationPage","measuredTime":"00:00:00.2587706"},"hdr":{"level":"Information","timestamp":"2018-02-07T21:59:12.3973812Z","lineNum":0,"loc":"ABC","ABCId":"0170","ip":"xx.xx.xx.xx","hostName":"xx.xx","macaddress":"mac-d","eventid":0,"appVersion":"18","appName":"Logon","deviceModel":"","osVersion":"1944","firmwareVersion":"17222.0"},"ver":"0.1"}&lt;/P&gt;

&lt;P&gt;In the first event we have to catch for the keyword "AuthenticationPage Loaded" and check for any events in past 2-3 minutes if the below event(or any event ) happened which has error "Unhandled Exception" . And if that is the case we need the count based on the location.&lt;/P&gt;

&lt;P&gt;{"bdy":{"msg":"&lt;STRONG&gt;&lt;CODE&gt;Unhandled Exception&lt;/CODE&gt;&lt;/STRONG&gt;","ex":{"Msg":"Unable to Claim . P.Scanner.GetDefaultAsync() returned null. This generally means you need to add DeviceCapability for Service in Package.appxmanifest file.","StackTrace":" at Abcde.Core.device.WinRT.Scanner.d__32.MoveNext()\r\n--- End of stack trace from previous location where exception was thrown ---\r\n at &lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2018 22:03:59 GMT</pubDate>
    <dc:creator>macadminrohit</dc:creator>
    <dc:date>2018-02-07T22:03:59Z</dc:date>
    <item>
      <title>How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368842#M163060</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;

&lt;P&gt;I have got a requirement where I have a few events where one of the fields contains some keyword say "Unhandled exception" which is being followed by subsequent events with different keywords say "Authorisation Started". &lt;/P&gt;

&lt;P&gt;So basically I am trying to analyze different events where the Field is the same but different keywords and we are trying to check for that relationship which will help us to find the count of events where one event led to another. &lt;/P&gt;

&lt;P&gt;let me know if that is possible and through which command.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:19:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368842#M163060</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2018-02-07T21:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368843#M163061</link>
      <description>&lt;P&gt;This is definitely possible, and it will be easiest for us to help if you can provide some sample events (with sensitive data redacted, if necessary). When you post them, use the &lt;CODE&gt;101010&lt;/CODE&gt; code button to wrap your events and make them more easily readable.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:27:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368843#M163061</guid>
      <dc:creator>elliotproebstel</dc:creator>
      <dc:date>2018-02-07T21:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368844#M163062</link>
      <description>&lt;P&gt;Could you describe this in more detail? A sample set of events would do wonders. Also, do you want to do this at index time or at search time?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:44:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368844#M163062</guid>
      <dc:creator>DUThibault</dc:creator>
      <dc:date>2018-02-07T21:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368845#M163063</link>
      <description>&lt;P&gt;Here you go, below is the &lt;/P&gt;

&lt;P&gt;{"bdy":{"msg":"&lt;STRONG&gt;AuthenticationPage loaded&lt;/STRONG&gt;.","metricName":"PageLoad","metricValue":"AuthenticationPage","measuredTime":"00:00:00.2587706"},"hdr":{"level":"Information","timestamp":"2018-02-07T21:59:12.3973812Z","lineNum":0,"loc":"ABC","ABCId":"0170","ip":"xx.xx.xx.xx","hostName":"xx.xx","macaddress":"mac-d","eventid":0,"appVersion":"18","appName":"Logon","deviceModel":"","osVersion":"1944","firmwareVersion":"17222.0"},"ver":"0.1"}&lt;/P&gt;

&lt;P&gt;In the first event we have to catch for the keyword "AuthenticationPage Loaded" and check for any events in past 2-3 minutes if the below event(or any event ) happened which has error "Unhandled Exception" . And if that is the case we need the count based on the location.&lt;/P&gt;

&lt;P&gt;{"bdy":{"msg":"&lt;STRONG&gt;&lt;CODE&gt;Unhandled Exception&lt;/CODE&gt;&lt;/STRONG&gt;","ex":{"Msg":"Unable to Claim . P.Scanner.GetDefaultAsync() returned null. This generally means you need to add DeviceCapability for Service in Package.appxmanifest file.","StackTrace":" at Abcde.Core.device.WinRT.Scanner.d__32.MoveNext()\r\n--- End of stack trace from previous location where exception was thrown ---\r\n at &lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:03:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368845#M163063</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2018-02-07T22:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368846#M163064</link>
      <description>&lt;P&gt;{"bdy":{"msg":"AuthenticationPage loaded.","metricName":"PageLoad","metricValue":"AuthenticationPage","measuredTime":"00:00:00.2587706"},"hdr":{"level":"Information","timestamp":"2018-02-07T21:59:12.3973812Z","lineNum":0,"loc":"ABC","ABCId":"0170","ip":"xx.xx.xx.xx","hostName":"xx.xx","macaddress":"mac-d","eventid":0,"appVersion":"18","appName":"Logon","deviceModel":"","osVersion":"1944","firmwareVersion":"17222.0"},"ver":"0.1"}&lt;/P&gt;

&lt;P&gt;In the first event we have to catch for the keyword "AuthenticationPage Loaded" and check for any events in past 2-3 minutes if the below event(or any event ) happened which has error "Unhandled Exception" . And if that is the case we need the count based on the location.&lt;/P&gt;

&lt;P&gt;{"bdy":{"msg":"&lt;CODE&gt;Unhandled Exception&lt;/CODE&gt;","ex":{"Msg":"Unable to Claim . P.Scanner.GetDefaultAsync() returned null. This generally means you need to add DeviceCapability for Service in Package.appxmanifest file.","StackTrace":" at Abcde.Core.device.WinRT.Scanner.d__32.MoveNext()\r\n--- End of stack trace from previous location where exception was thrown ---\r\n at&lt;/P&gt;

&lt;P&gt;I want to achieve this in a dashboard, so it will be at the search time.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:04:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368846#M163064</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2018-02-07T22:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368847#M163065</link>
      <description>&lt;P&gt;So basically these are JSON events which are automatically parsed by splunk into fields. And i need to search for the strings in bdy.msg field and find the number of such occurrences by another field (bdy.mac)&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:07:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368847#M163065</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2018-02-07T22:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: How can I analyze different events where the field is the same but different keywords and get a count of events where one event led to another?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368848#M163066</link>
      <description>&lt;P&gt;And good thing is that there is a field in these events which is macaddress and we want to capture these events for the same macaddress. So i am thinking we could do this using transaction command. &lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:30:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-analyze-different-events-where-the-field-is-the-same/m-p/368848#M163066</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2018-02-07T22:30:02Z</dc:date>
    </item>
  </channel>
</rss>

