Splunk Search

Correlating audit log events

mrcusanelli
New Member

I'm having trouble remembering how to correlate two separate events into one event for RHEL audit log events.

Im trying to capture 1309 events (file deletions) and the related 1307 event (directory of the file deletion). These events are logged at the same time, so im trying to use the transaction command with a maxspan of 1 second. But im only getting the same event types with in that time maxspan time not the related event. i.e two 1307s in that span.

I haven't done this is so long i cant wrap my head around how to do it anymore.

index=os host='hostname' type=1307 OR type=1309 | transaction maxspan=1s

Event examples im trying to correlate

2018-07-12T10:08:44.042301-04:00 'hostname' : type=1307 audit(1531417269.239:49430042): cwd="/apps/SAS/v9.4/config/Lev1/SASDataManagementDataServer/data"

2018-07-12T10:08:44.042301-04:00 'hostname' kernel: [1477027.861370] type=1309 audit(1531404524.033:48993388): argc=3 a0="rm" a1="-i" a2="gary.log"

any help would greatly be appreciated.

0 Karma

woodcock
Esteemed Legend

Like this:

index=os host='hostname' type=1307 OR type=1309
| stats values(type) by _time
0 Karma

renjith_nair
Legend

Hi @mrcusanelli ,

Have you tried using startswith "type=1307" and endswith type=1309 in the transaction?

https://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Transaction#Optional_arguments

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

mrcusanelli
New Member

I'll give that a try

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...