Splunk Search

correlate 2 events

roopeshetty
Path Finder

Hi Guys,

We will have 2 events within a fraction of 3- 4 seconds when ever a user fail to login to our application as below;

2019-12-23 08:03:10 192.168.57.88 - 10.10.10.1 USER Peter profileID 1d48057e-1115-4254-981d-c789f7f47ca4 -
2019-12-23 08:03:13 192.168.57.88 - 10.10.10.1 LoginFailed profileID 1d48057e-1115-4254-981d-c789f7f47ca4 –

Here USER names will be logged in the first event and the Login Status as LoginFailed will be logged in second event. Hence, we are struggling to create the alerts or dashboards which contains the USER names along with the Login Status when the Login failures happens. Can some one please provide us the query which will join or correlate above 2 lines and show the output with USER name as well Login Status.
Please note that we can use the ProfileID as the common factor between these 2 events as this will be same in both the events for a user.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try ... | stats latest(_time) as _time, values(*) as * by profileID | table _time USER profileID LoginStatus.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...