Splunk Search

Check Point: Linking events together to produce a results set

nbonner
Explorer

I am looking to build a dashboard where a user can submit a session number & retrieve the entire history of a session with one catch: the session id isn’t on the last event but there is a UID that links one of the events to the last event. This pertains to Check Point SmartWorkflow if that helps anyone.

The relevant events would look something like this:

SessionID1 user1 changeType1 UID1
SessionID1 user1 changeType2 UID2
SessionID1 user1 changeType3 UID3
SessionID1 user1 changeType4 UID4
NoSessionID user2 changeType5 UID2

It would be nice to just use the session id but I also need the extra event that includes UID2 with no session id. This is probably a simple query but I haven’t quite figured it out.

Thanks!

Tags (1)
0 Karma
1 Solution

sundareshr
Legend

Try this (assuming fields have been extracted)

index=* sessionid=$sid$ OR [search index=* changetype2 | return uid]

View solution in original post

0 Karma

sundareshr
Legend

Try this (assuming fields have been extracted)

index=* sessionid=$sid$ OR [search index=* changetype2 | return uid]
0 Karma

nbonner
Explorer

This ended up being close to the correct query. Thank you for the assistance.

0 Karma

sundareshr
Legend

How do you know which UID is tied to this session? for example Is the always the same as the UID for the second event?

0 Karma

nbonner
Explorer

Ah yes I left that out.
ChangeType2 is always correlated with UID2

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...