<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: correlate value using common field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/682037#M233040</link>
    <description>You should look e.g where an isnull function. With it you could drop unwanted rows away.</description>
    <pubDate>Tue, 26 Mar 2024 19:05:57 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2024-03-26T19:05:57Z</dc:date>
    <item>
      <title>correlate value using common field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/681736#M232960</link>
      <description>&lt;P&gt;Here is my search in question, the common field is the SessionID&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=eis_lb apm_eis_rdp
|fillnull value="-"
|search UserID!="-"
| rex field=_raw "\/Common\/apm_eis_rdp:ent-eis[:a-zA-Z0-9_.-](?'SessionID'........)"
|search company_info="*"
|rename company_info as "Agency"
| table _time, SessionID, UserID,Full_Name, Agency, HostName, client_ip
| sort - _time

_time                                  SessionID UserID      Full_Name Agency   HostName client_ip
2024-03-22 08:25:29 4f89ae57 Redacted Redacted Redacted Redacted            -&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;If I remove the Search UserID I can see the matching session ID and the client_ip is present.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;_time&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SessionID&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;UserID&amp;nbsp; &amp;nbsp; Full_Name&amp;nbsp; &amp;nbsp; Agency&amp;nbsp; &amp;nbsp; &amp;nbsp; HostName&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; client_ip&lt;BR /&gt;&lt;BR /&gt;2024-03-22 14:26:48 4f89ae57&amp;nbsp; &amp;nbsp; &amp;nbsp;Redacted Redacted&amp;nbsp; &amp;nbsp; Redacted&amp;nbsp; &amp;nbsp;Redacted&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; -&lt;BR /&gt;2024-03-22 14:25:52 4f89ae57 - - - -&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Redacted&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;How can I create a search like above to show the client_ip maching the SessionID&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 22:22:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/681736#M232960</guid>
      <dc:creator>MrGlass</dc:creator>
      <dc:date>2024-03-22T22:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: correlate value using common field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/681737#M232961</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;normally you could use e.g. stats to do correlation between events. In your case try e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;...
| stats first(_time) as _time values(*) as * by SessionID&lt;/LI-CODE&gt;&lt;P&gt;This will generate one event by each &lt;SPAN&gt;SessionID with&amp;nbsp;&lt;/SPAN&gt;contains other fields as multivalue fields or if values was same in all combined events then normal field.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 22:07:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/681737#M232961</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2024-03-22T22:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: correlate value using common field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/682004#M233030</link>
      <description>&lt;P&gt;Thank You, this worked, the only thing I wish I could see is just the matched lines and get rid of the blank rows.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 13:55:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/682004#M233030</guid>
      <dc:creator>MrGlass</dc:creator>
      <dc:date>2024-03-26T13:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: correlate value using common field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/682037#M233040</link>
      <description>You should look e.g where an isnull function. With it you could drop unwanted rows away.</description>
      <pubDate>Tue, 26 Mar 2024 19:05:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/correlate-value-using-common-field/m-p/682037#M233040</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2024-03-26T19:05:57Z</dc:date>
    </item>
  </channel>
</rss>

