<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to deal with Logon/Logoff scatterd over multiple events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701527#M237964</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213890"&gt;@jroedel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;ok, you have to create eventtypes and add to login, logout and logfail eventtypes the tag "authentication.&lt;/P&gt;&lt;P&gt;You should try to use the Add-On Builder app (&lt;A href="https://splunkbase.splunk.com/app/2962" target="_blank"&gt;https://splunkbase.splunk.com/app/2962&lt;/A&gt;) or the CIM-Vladiator app (&lt;A href="https://splunkbase.splunk.com/app/2968" target="_blank"&gt;https://splunkbase.splunk.com/app/2968&lt;/A&gt;) that helps you in field aliases, calculated fields and tagging.&lt;/P&gt;&lt;P&gt;I usually use the second one.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 10 Oct 2024 13:04:24 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-10-10T13:04:24Z</dc:date>
    <item>
      <title>How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701520#M237957</link>
      <description>&lt;P&gt;I have onboarded data from a system,&amp;nbsp; that scatters actual events over many logging events. Especially successful or failed logins cause me some headache.&lt;/P&gt;&lt;P&gt;Successful login:&lt;BR /&gt;&amp;lt;timestamp&amp;gt; Connection 'id123' from '192.168.1.100' has logged onto the server &lt;BR /&gt;&amp;lt;timestamp&amp;gt; User 'johndoe' logged on (Connection id='id123') &lt;BR /&gt;[ Time passes until John eventually decides to logoff again]&lt;BR /&gt; &amp;lt;timestamp&amp;gt; Connection 'id123' from has logged off the server&lt;/P&gt;&lt;P&gt;Failed login:&lt;BR /&gt;&amp;lt;timestamp&amp;gt; Connection 'id123' from '192.168.1.100' has logged onto the server &lt;BR /&gt;&amp;lt;timestamp&amp;gt; Connection 'id123' from has logged off the server&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Of course, I can fiddle around with &lt;FONT face="courier new,courier"&gt;transaction&lt;/FONT&gt; or even &lt;FONT face="courier new,courier"&gt;stats&lt;/FONT&gt; or whatever to list successful and failed logins or create an alert for it. However that is absolutely not elegant.&lt;/P&gt;&lt;P&gt;What is best practice, to get those data nicely streamlined with eventtypes and tags?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 11:49:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701520#M237957</guid>
      <dc:creator>jroedel</dc:creator>
      <dc:date>2024-10-10T11:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701521#M237958</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213890"&gt;@jroedel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you can create an eventtype for login and one for logout, tagging these eventtypes with a related tag,&lt;/P&gt;&lt;P&gt;so you can use then in your searches.&lt;/P&gt;&lt;P&gt;but what's your requirement?&lt;/P&gt;&lt;P&gt;what do you need to receive as result?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 11:56:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701521#M237958</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-10-10T11:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701526#M237963</link>
      <description>&lt;P&gt;Maybe I just do not see it: How would I apply an event type for a successfull login event, that is scattered over multiple log entries?&lt;/P&gt;&lt;P&gt;My requirement is, to achieve cim-comliance with this data source.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 13:00:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701526#M237963</guid>
      <dc:creator>jroedel</dc:creator>
      <dc:date>2024-10-10T13:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701527#M237964</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213890"&gt;@jroedel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;ok, you have to create eventtypes and add to login, logout and logfail eventtypes the tag "authentication.&lt;/P&gt;&lt;P&gt;You should try to use the Add-On Builder app (&lt;A href="https://splunkbase.splunk.com/app/2962" target="_blank"&gt;https://splunkbase.splunk.com/app/2962&lt;/A&gt;) or the CIM-Vladiator app (&lt;A href="https://splunkbase.splunk.com/app/2968" target="_blank"&gt;https://splunkbase.splunk.com/app/2968&lt;/A&gt;) that helps you in field aliases, calculated fields and tagging.&lt;/P&gt;&lt;P&gt;I usually use the second one.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 13:04:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701527#M237964</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-10-10T13:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701528#M237965</link>
      <description>&lt;P&gt;Lets for now focus on a *successful* login. As shown in my initial post, there are multiple events for the same successfull login. One does carry the username, the other carries the source ip.&lt;/P&gt;&lt;P&gt;On which one should I set the event type and tag? And how do I enrich that event with the field from the other one?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 13:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701528#M237965</guid>
      <dc:creator>jroedel</dc:creator>
      <dc:date>2024-10-10T13:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701529#M237966</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213890"&gt;@jroedel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;eventtype and tag aren't related to the fields:&lt;/P&gt;&lt;P&gt;you have to create at first an eventtype for the login, called e.g. "my_technology_login":&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=my_index sourcetype=my_sourcetype ("has logged onto the server" OR "logged on"&lt;/LI-CODE&gt;&lt;P&gt;and tag it as "Authentication" required BY CIM and "LOGIN".&lt;/P&gt;&lt;P&gt;then&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=my_index sourcetype=my_sourcetype (logoff OR "has logged off the server")&lt;/LI-CODE&gt;&lt;P&gt;and tag it as "Authentication" required BY CIM and "LOGOUT".&lt;/P&gt;&lt;P&gt;The last sample doesn't seems to be a logfail event, please check it and apply as the others.&lt;/P&gt;&lt;P&gt;Then you have to extract fields:&amp;nbsp;user and src using regexes.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 13:27:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701529#M237966</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-10-10T13:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701593#M237980</link>
      <description>&lt;P&gt;Event type cannot "merge" multiple events. As simple as that. So either process your data prior to ingesting so that you have a whole login event containing all interesting fields or do summary indexing and create synthetic events after ingesting original events.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 21:02:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701593#M237980</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-10-10T21:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701626#M237986</link>
      <description>&lt;P&gt;Thanks for clearifying, &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt; . So what would be the best practice for creating such synthetic events? A scheduled search every 5 (or so) Minutes? If yes, how to deal with:&lt;/P&gt;&lt;P&gt;- SH-Downtimes&lt;BR /&gt;- logins where only one of both needed events for a successful login is in the search time range, and the other is in the search time range of the previous run of the scheduled search&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 09:33:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701626#M237986</guid>
      <dc:creator>jroedel</dc:creator>
      <dc:date>2024-10-11T09:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with Logon/Logoff scatterd over multiple events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701635#M237987</link>
      <description>&lt;P&gt;1. To deal with possible outages you schedule it with continuous schedule - that means that your search will be scheduled for each continuous time period. See&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Report/Configurethepriorityofscheduledreports#Change_the_report_scheduling_mode_to_prioritize_completeness_of_data_over_recency_of_data" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Report/Configurethepriorityofscheduledreports#Change_the_report_scheduling_mode_to_prioritize_completeness_of_data_over_recency_of_data&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. For this you'd typically use longer search window (and typically you'd want to search with a slight (maybe not; depending on your data) delay to account for data ingestion latency). But as with any search (not just summary-building one), if you have some data outside of your search-range you won't find it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 10:14:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-deal-with-Logon-Logoff-scatterd-over-multiple-events/m-p/701635#M237987</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-10-11T10:14:42Z</dc:date>
    </item>
  </channel>
</rss>

