<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to correlate events from different sourcetypes from different timezones and no matching fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254089#M76083</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We have logs coming into Unix and Windows Webspere. Every logon in Windows generates an event in Unix with the type of security connection used (Ex: Web 3 and secure). The only thing matching in both the logs are index, and the challenge here is the logs in Windows Websphere have a _time of 5 hours ahead from that of Unix. I tried the search below, but no events are showing up.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ABC_XYZ UId="*" "Logon" sourcetype="websphere:unix"
| eval First_time = _time 
| join index
[ search index=ABC_XYZ "logon" "*web3qa*" sourcetype="websphere:windows" Target="*"
| eval Error_time = _time]
| where Error_time = First_time+18000
| stats  earliest(First_time) as First_Logon by UId
| fieldformat First_time =strftime(First_time,"%I:%M:%S%p")
| fieldformat Error_time =strftime(Error_time,"%I:%M:%S%p")
| table First_Logon,First_time,Target
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If editing the time in search doesn't work, my plan is to change the _time value in props file of the default app for this sourcetype. Please advise on how to do so.&lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Tue, 01 Dec 2015 13:24:35 GMT</pubDate>
    <dc:creator>shivarpith</dc:creator>
    <dc:date>2015-12-01T13:24:35Z</dc:date>
    <item>
      <title>How to correlate events from different sourcetypes from different timezones and no matching fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254089#M76083</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We have logs coming into Unix and Windows Webspere. Every logon in Windows generates an event in Unix with the type of security connection used (Ex: Web 3 and secure). The only thing matching in both the logs are index, and the challenge here is the logs in Windows Websphere have a _time of 5 hours ahead from that of Unix. I tried the search below, but no events are showing up.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ABC_XYZ UId="*" "Logon" sourcetype="websphere:unix"
| eval First_time = _time 
| join index
[ search index=ABC_XYZ "logon" "*web3qa*" sourcetype="websphere:windows" Target="*"
| eval Error_time = _time]
| where Error_time = First_time+18000
| stats  earliest(First_time) as First_Logon by UId
| fieldformat First_time =strftime(First_time,"%I:%M:%S%p")
| fieldformat Error_time =strftime(Error_time,"%I:%M:%S%p")
| table First_Logon,First_time,Target
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If editing the time in search doesn't work, my plan is to change the _time value in props file of the default app for this sourcetype. Please advise on how to do so.&lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 13:24:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254089#M76083</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2015-12-01T13:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate events from different sourcetypes from different timezones and no matching fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254090#M76084</link>
      <description>&lt;P&gt;Have you looked at the &lt;CODE&gt;map&lt;/CODE&gt; command? &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/map"&gt;http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/map&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 17:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254090#M76084</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2015-12-01T17:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate events from different sourcetypes from different timezones and no matching fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254091#M76085</link>
      <description>&lt;P&gt;can you please eloberate or edit my search query? and like i said i dont have any matching field to map from.. the log from unix just shows the type of connection used and windows shows the userid. As we know that they have a time difference of 5 hours we can manually see the connection between two logs. how do i match the events based on _time and _time+18000?&lt;/P&gt;

&lt;P&gt;Please advise&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 20:11:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254091#M76085</guid>
      <dc:creator>shivarpith</dc:creator>
      <dc:date>2015-12-01T20:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to correlate events from different sourcetypes from different timezones and no matching fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254092#M76086</link>
      <description>&lt;P&gt;Share some sample data from both logs. &lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 21:53:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-correlate-events-from-different-sourcetypes-from/m-p/254092#M76086</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2015-12-01T21:53:33Z</dc:date>
    </item>
  </channel>
</rss>

