<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to generate a search to display results only for a COMBINATION of events? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250064#M74647</link>
    <description>&lt;P&gt;How about this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=foo sourcetype=bar EventCode=4624 Logon_Type=2 OR Logon_Type=10  | stats values(Logon_Type) as Logon_Types by host | where mvcount(Logon_Types)=2
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 23 Jan 2017 17:17:34 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2017-01-23T17:17:34Z</dc:date>
    <item>
      <title>How to generate a search to display results only for a COMBINATION of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250062#M74645</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;

&lt;P&gt;I'm trying to do a search that would return results only for a combination of 2 events. I'm specifically looking for successful logins &lt;CODE&gt;EventCode=4624&lt;/CODE&gt; and only show results if for the host has had both interactive &lt;CODE&gt;Logon_Type=2&lt;/CODE&gt; and remote &lt;CODE&gt;Logon_Type=10&lt;/CODE&gt; logins. I tried my luck with &lt;CODE&gt;transaction&lt;/CODE&gt; and &lt;CODE&gt;dedup&lt;/CODE&gt; but to no luck. Any suggestions?&lt;/P&gt;

&lt;P&gt;Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Host 1 Login, Remote
Host 2 Login, Remote
Host 2 Login, Remote
Host 1 Login, Interactive
Host 3 Login, Interactive
Host 4 Login, Remote
Host 4 Login, Interactive
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This would ideally just return info on Host 1 and Host 4 because they have both interactive and remote logons, while Host 2 has only remote and Host 3 has only interactive.&lt;/P&gt;

&lt;P&gt;Ideally the result would be just a table of hosts and possibly timestamps of the logins.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2017 15:52:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250062#M74645</guid>
      <dc:creator>kalik</dc:creator>
      <dc:date>2017-01-23T15:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to generate a search to display results only for a COMBINATION of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250063#M74646</link>
      <description>&lt;P&gt;Hi kalik, &lt;/P&gt;

&lt;P&gt;I think you can use the &lt;STRONG&gt;mvcombine&lt;/STRONG&gt; command to combine different login values pertaining to the same host into a single multivalue field. Assuming login is your field name, you can use the following example:  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | mvcombine delim=";" login 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;After that, you can easily search for the multivalue login field for your login type and return the hostnames properly.  &lt;/P&gt;

&lt;P&gt;Hope this helps. Thanks!&lt;BR /&gt;
Hunter&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2017 17:11:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250063#M74646</guid>
      <dc:creator>hunters_splunk</dc:creator>
      <dc:date>2017-01-23T17:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to generate a search to display results only for a COMBINATION of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250064#M74647</link>
      <description>&lt;P&gt;How about this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=foo sourcetype=bar EventCode=4624 Logon_Type=2 OR Logon_Type=10  | stats values(Logon_Type) as Logon_Types by host | where mvcount(Logon_Types)=2
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Jan 2017 17:17:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250064#M74647</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-01-23T17:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to generate a search to display results only for a COMBINATION of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250065#M74648</link>
      <description>&lt;P&gt;Thanks a lot somesoni2, that worked exactly like I wanted it to do, and such a simple and elegant solution too! Thanks again!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 12:04:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250065#M74648</guid>
      <dc:creator>kalik</dc:creator>
      <dc:date>2017-01-24T12:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to generate a search to display results only for a COMBINATION of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250066#M74649</link>
      <description>&lt;P&gt;Thanks Hunter, that didn't exactly worked the way I wanted it to, but thank you for the suggestion!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 12:05:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-generate-a-search-to-display-results-only-for-a/m-p/250066#M74649</guid>
      <dc:creator>kalik</dc:creator>
      <dc:date>2017-01-24T12:05:26Z</dc:date>
    </item>
  </channel>
</rss>

