<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tricky Search for 2 events in same Index in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704022#M238600</link>
    <description>&lt;P&gt;Correlating on time alone while possible is always tricky. You never know what delay you're gonna get between these two events. And you might get more than just those two events at this particular timestamp. It's best if you either have both those pieces of information within one event or at least they both include some unique identifier so that you can unambiguously connect one with the other.&lt;/P&gt;</description>
    <pubDate>Sat, 09 Nov 2024 23:06:43 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2024-11-09T23:06:43Z</dc:date>
    <item>
      <title>Tricky Search for 2 events in same Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704020#M238598</link>
      <description>&lt;P&gt;So I have an Index with working alerts thanks to your guys help.&lt;/P&gt;&lt;P&gt;I have a question on 2 separate events at the same time.&lt;/P&gt;&lt;P&gt;1st Event : Invalid password provided for user : xxxxxxxx (this is in the Event)&lt;/P&gt;&lt;P&gt;2nd Event : &amp;nbsp;GET /Project/1234/ HTTP/1.1 401 (this is basically letting me know about the first event but what Project they tried to connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would one write to Get the Username of the invalid password and chlorate that with the project at the same time underneath&lt;/P&gt;&lt;P&gt;Example User xxxxxx put in an invalid password for Project 1234.&lt;/P&gt;&lt;P&gt;Thinking it is easier to get my team to write it all in 1 event for another release.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2024 22:57:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704020#M238598</guid>
      <dc:creator>LizAndy123</dc:creator>
      <dc:date>2024-11-09T22:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: Tricky Search for 2 events in same Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704021#M238599</link>
      <description>&lt;P&gt;I will add - it is the same index but the 1st event is from one source type and the 2nd event from another source type (just different server logs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2024 23:00:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704021#M238599</guid>
      <dc:creator>LizAndy123</dc:creator>
      <dc:date>2024-11-09T23:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Tricky Search for 2 events in same Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704022#M238600</link>
      <description>&lt;P&gt;Correlating on time alone while possible is always tricky. You never know what delay you're gonna get between these two events. And you might get more than just those two events at this particular timestamp. It's best if you either have both those pieces of information within one event or at least they both include some unique identifier so that you can unambiguously connect one with the other.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2024 23:06:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704022#M238600</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-11-09T23:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Tricky Search for 2 events in same Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704054#M238602</link>
      <description>&lt;P&gt;In addition to the technical consideration&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;points out, you should make a blunt case to your developers that this is logically impossible unless&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;there is ever one user accessing your entire Web site with credentials, or&lt;/LI&gt;&lt;LI&gt;there is a strict mechanism to prevent more than one user to access your Web site during any prescribed time interval.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This, and if code authentication failure is the ONLY reason 401 is returned. (HTTP 401 is for unauthorized access, not an indicator of authentication failure.)&lt;/P&gt;&lt;P&gt;Present the above two logs to your developers, ask them what logic can they use (without Splunk) to tell you why the second event is related to the same user as the second event?&lt;/P&gt;&lt;P&gt;If your logs contain additional identifiable information such as client IP address, there is a better chance for such correlation. &amp;nbsp;But your mock data don't suggest existence of such data.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 01:50:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tricky-Search-for-2-events-in-same-Index/m-p/704054#M238602</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-11-11T01:50:17Z</dc:date>
    </item>
  </channel>
</rss>

