<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic finding result based off 2 queries in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/finding-result-based-off-2-queries/m-p/82272#M20895</link>
    <description>&lt;P&gt;I asked this question last year and the search worked great, but as of version 5, I'm not getting any results anymore.  Logs from one source look like this:&lt;/P&gt;

&lt;P&gt;04/02/13-11:34:57.686794  [**] [1:2008038:8] ET MALWARE User-Agent (Mozilla/4.0 (compatible ICS))  [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} xxx.xxx.xxx.xxx:51611 -&amp;gt; yyy.yyy.yyy.yyy:80&lt;/P&gt;

&lt;P&gt;and the logs that I'm interested look like this:&lt;/P&gt;

&lt;P&gt;Apr  2 11:40:45 wc-b authmgr[1613]: &amp;lt;522008&amp;gt; &lt;NOTI&gt;User Authentication Successful: username=user MAC=xx.xx.xx.xx.xx.xx IP=xxx.xxx.xxx.xxx role=Wireless-Campus-Compliant VLAN=2190 &lt;/NOTI&gt;&lt;/P&gt;

&lt;P&gt;The search that I'm interested in pulls the username out of the second query.  This search worked great last year:  "Trojan" | map search="search "User Authentication" IP=$dest_ip$" | fields username&lt;/P&gt;

&lt;P&gt;It's not working any more.  The dest_ip from the first source should map to the IP address in the second source.  I get no results.  Any thoughts on what changed or what I could do differently to return the same result?&lt;/P&gt;</description>
    <pubDate>Tue, 02 Apr 2013 17:44:51 GMT</pubDate>
    <dc:creator>gregwilliams</dc:creator>
    <dc:date>2013-04-02T17:44:51Z</dc:date>
    <item>
      <title>finding result based off 2 queries</title>
      <link>https://community.splunk.com/t5/Splunk-Search/finding-result-based-off-2-queries/m-p/82272#M20895</link>
      <description>&lt;P&gt;I asked this question last year and the search worked great, but as of version 5, I'm not getting any results anymore.  Logs from one source look like this:&lt;/P&gt;

&lt;P&gt;04/02/13-11:34:57.686794  [**] [1:2008038:8] ET MALWARE User-Agent (Mozilla/4.0 (compatible ICS))  [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} xxx.xxx.xxx.xxx:51611 -&amp;gt; yyy.yyy.yyy.yyy:80&lt;/P&gt;

&lt;P&gt;and the logs that I'm interested look like this:&lt;/P&gt;

&lt;P&gt;Apr  2 11:40:45 wc-b authmgr[1613]: &amp;lt;522008&amp;gt; &lt;NOTI&gt;User Authentication Successful: username=user MAC=xx.xx.xx.xx.xx.xx IP=xxx.xxx.xxx.xxx role=Wireless-Campus-Compliant VLAN=2190 &lt;/NOTI&gt;&lt;/P&gt;

&lt;P&gt;The search that I'm interested in pulls the username out of the second query.  This search worked great last year:  "Trojan" | map search="search "User Authentication" IP=$dest_ip$" | fields username&lt;/P&gt;

&lt;P&gt;It's not working any more.  The dest_ip from the first source should map to the IP address in the second source.  I get no results.  Any thoughts on what changed or what I could do differently to return the same result?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2013 17:44:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/finding-result-based-off-2-queries/m-p/82272#M20895</guid>
      <dc:creator>gregwilliams</dc:creator>
      <dc:date>2013-04-02T17:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: finding result based off 2 queries</title>
      <link>https://community.splunk.com/t5/Splunk-Search/finding-result-based-off-2-queries/m-p/82273#M20896</link>
      <description>&lt;P&gt;I'm not sure what may have changed, but here's a different approach. You're basically trying to use the dest_ip field from one search to find events in another search, right? A basic pattern for that looks like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"User Authentication" [search "Trojan" | dedup dest_ip | table dest_ip]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The subsearch will evaluate to something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;( ( dest_ip = "..." ) OR ( dest_ip = "..." ) ... OR ( dest_ip ="..." ) )
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Apr 2013 18:03:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/finding-result-based-off-2-queries/m-p/82273#M20896</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2013-04-02T18:03:25Z</dc:date>
    </item>
  </channel>
</rss>

