<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: events correlation rules in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752385#M242645</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;it's simple. I receive lot&amp;nbsp;of events from different hosts. They mention that all the hosts are down. but the reason is that the router connected to these hosts is down. So i don't want to receive messages from hosts&amp;nbsp; but just 1 message from the router&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Aug 2025 13:13:59 GMT</pubDate>
    <dc:creator>trazomtg</dc:creator>
    <dc:date>2025-08-28T13:13:59Z</dc:date>
    <item>
      <title>events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752377#M242642</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;how to correlate event with event correlation rule ? so, how can i write a correlation rule ?&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 12:39:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752377#M242642</guid>
      <dc:creator>trazomtg</dc:creator>
      <dc:date>2025-08-28T12:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752379#M242643</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/312710"&gt;@trazomtg&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order for us to help you please could you provide more detail on what you are trying to achieve and product(s) you’re using.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt; &lt;STRONG&gt;Did this answer help you? If so, please consider&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 12:58:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752379#M242643</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-28T12:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752382#M242644</link>
      <description>&lt;P&gt;Correlation search is just a scheduled search with extra steps. So you need to know what you are looking for write a search looking for it (preferably an effective one since it's gonna be spawned often probably) and configure the rest of the settings for the correlation search (which will be different depending on whether you mean a correlation search in SE or ITSI)&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 13:03:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752382#M242644</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-28T13:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752385#M242645</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;it's simple. I receive lot&amp;nbsp;of events from different hosts. They mention that all the hosts are down. but the reason is that the router connected to these hosts is down. So i don't want to receive messages from hosts&amp;nbsp; but just 1 message from the router&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 13:13:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752385#M242645</guid>
      <dc:creator>trazomtg</dc:creator>
      <dc:date>2025-08-28T13:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752390#M242646</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/312710"&gt;@trazomtg&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as the others already said, in Splunk, you can correlate events from the same or different data sources, even if etherogenous or different.&lt;/P&gt;&lt;P&gt;The rule to create a correlation search, is to identify the correlation key, in other words the fields to use to correlate the different events.&lt;/P&gt;&lt;P&gt;We could help you, but it's mandatory to have more details about the data flows to correlate.&lt;/P&gt;&lt;P&gt;as an exmple, you could correlate access logs to a windows server with an entrance badge, so if in windows the login is recognized by user and EventCode=4624 and e.g. in the entrance badge the user field is username and the action is action="access", you could create a search like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index=wineventlog EventCode=4624) OR (index=entrance_badge action="access")
| user=coalesce(user,username)
| stats 
     earliest(eval(if(index=wineventlog,_time,""))) AS wineventlog_time
     earliest(eval(if(index=entrance_badge,_time,""))) AS entrance_badge_time
     dc(index) AS index_count
     BY user
| eval 
     wineventlog_time=strftime(wineventlog_time,"%Y-%m-%d %H:%M:%S"),
     entrance_badge_time=strftime(entrance_badge_time,"%Y-%m-%d %H:%M:%S")&lt;/LI-CODE&gt;&lt;P&gt;In this way, you can check that a user is present in the office when accessed a server.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 13:25:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752390#M242646</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-08-28T13:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: events correlation rules</title>
      <link>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752477#M242652</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;indicates, you will need a common/correlation field between host message and router message. &amp;nbsp;It is best for you to illustrate your data, even mock data, and illustrate how you want the output to be. (You have just explained the logic between input and desired output. &amp;nbsp;This is good.)&lt;/P&gt;&lt;P&gt;Short of your illustrations, let me assume that the common field in host message (sourcetype=host_message) is named &lt;FONT face="courier new,courier"&gt;gateway&lt;/FONT&gt;, and &amp;nbsp;that in router message (sourcetype=router_message) is named &lt;FONT face="courier new,courier"&gt;side_a&lt;/FONT&gt;. &amp;nbsp;Assume further that there is a field named &lt;FONT face="courier new,courier"&gt;status&lt;/FONT&gt; in both. (But statuses are independent despite a common name.)&lt;/P&gt;&lt;P&gt;While the above assumptions about data are reasonable, it is even more critical to have your input about your use case, i.e., desired results. &amp;nbsp;Here, I imagine that you want Splunk to output all host failure messages if their common gateway is up, but if a common gateway is down, you want to suppress host failure messages, only output router failure message.&lt;/P&gt;&lt;P&gt;This is how you should describe your use case using &lt;STRONG&gt;data&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;host:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;gateway&lt;/TD&gt;&lt;TD&gt;host&lt;/TD&gt;&lt;TD&gt;sourcetype&lt;/TD&gt;&lt;TD&gt;status&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.0.1&lt;/TD&gt;&lt;TD&gt;host1&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;up&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.0.1&lt;/TD&gt;&lt;TD&gt;host2&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.1.1&lt;/TD&gt;&lt;TD&gt;host3&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.0.1&lt;/TD&gt;&lt;TD&gt;host4&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;up&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.1.1&lt;/TD&gt;&lt;TD&gt;host5&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.0.1&lt;/TD&gt;&lt;TD&gt;host6&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;10.0.1.1&lt;/TD&gt;&lt;TD&gt;host7&lt;/TD&gt;&lt;TD&gt;host_message&lt;/TD&gt;&lt;TD&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;router:&lt;/P&gt;&lt;TABLE width="229px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="65px"&gt;host&lt;/TD&gt;&lt;TD width="68.3125px"&gt;side_a&lt;/TD&gt;&lt;TD width="40px"&gt;sourcetype&lt;/TD&gt;&lt;TD width="55.921875px"&gt;status&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="65px"&gt;router1&lt;/TD&gt;&lt;TD width="68.3125px"&gt;10.0.0.1&lt;/TD&gt;&lt;TD width="40px"&gt;router_message&lt;/TD&gt;&lt;TD width="55.921875px"&gt;up&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="65px"&gt;router2&lt;/TD&gt;&lt;TD width="68.3125px"&gt;10.0.1.1&lt;/TD&gt;&lt;TD width="40px"&gt;router_message&lt;/TD&gt;&lt;TD width="55.921875px"&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Desired results:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;gateway&lt;/TD&gt;&lt;TD&gt;host&lt;/TD&gt;&lt;TD&gt;side_a&lt;/TD&gt;&lt;TD&gt;sourcetype&lt;/TD&gt;&lt;TD&gt;status&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="68.3125px"&gt;10.0.0.1&lt;/TD&gt;&lt;TD width="65px"&gt;host2&lt;/TD&gt;&lt;TD width="68.3125px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="129px"&gt;host_message&lt;/TD&gt;&lt;TD width="51.234375px"&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="68.3125px"&gt;10.0.0.1&lt;/TD&gt;&lt;TD width="65px"&gt;host6&lt;/TD&gt;&lt;TD width="68.3125px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="129px"&gt;host_message&lt;/TD&gt;&lt;TD width="51.234375px"&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="68.3125px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="65px"&gt;router2&lt;/TD&gt;&lt;TD width="68.3125px"&gt;10.0.1.1&lt;/TD&gt;&lt;TD width="129px"&gt;router_message&lt;/TD&gt;&lt;TD width="51.234375px"&gt;down&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Logic between data and desired results:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When a gateway router is down, I don't want to see host failure messages using that gateway.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This is a search to get such output from illustrated data:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sourcetype IN (host_message, router_message) status = down
| eval down_router = if(sourcetype == "router_message", host, null())
| eval router = coalesce(gateway, side_a)
| eventstats values(down_router) as down_router by router
| where isnull(down_router) or sourcetype == "router_message"
| fields - down_router router&lt;/LI-CODE&gt;&lt;P&gt;Here is an emulation for you to play with and compare with real data.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults format=csv data="host,gateway,status
host1, 10.0.0.1, up
host2, 10.0.0.1, down
host3, 10.0.1.1, down
host4, 10.0.0.1, up
host5, 10.0.1.1, down
host6, 10.0.0.1, down
host7, 10.0.1.1, down"
| eval sourcetype = "host_message"
| append
    [ makeresults format=csv data="host, side_a, status
    router1, 10.0.0.1, up
    router2, 10.0.1.1, down"
    | eval sourcetype = "router_message"]
| search status = down
``` the above emulates
sourcetype IN (host_message, router_message) status = down
```&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 07:01:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/events-correlation-rules/m-p/752477#M242652</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-08-29T07:01:43Z</dc:date>
    </item>
  </channel>
</rss>

