Splunk Search

Melding continuation events while cherrypicking data from each

CrailAtWork
Engager

Hello all,

I've tried to search here and through search engines with no luck.  I can't seem to get the knack for referencing which event's information I want to pick from.

I'm trying to join together information from two different events, in the same sourcetype, but picking the relevant information from each of the two raw events into a singular more meaningful event.

An example:
Event 1:

 

45        1    191 2020-07-20 20:55:26.540        1         873     23        NULL NULL           cn13mhy                        SSS_ABC123_DB                  NULL                                                                                                                                                                                                                                                            NULL                          
	 ; ; ; ; , 8.8.8.8, network password sybase encryption; ; cn13mhy/ase;  

 

Event 2:

 

1        0    191 2020-07-20 20:55:26.543        1         873   NULL        NULL NULL           cn13mhy                        sybsystemprocs                 NULL                                                                                                                                                                                                                                                            NULL                          
	 CLIENTAPPINFO;app_name=PPP host_pid=17544                                                                                                                                                                                                                         NULL 

 


The first numeric is the event number.  45 is the Sybase ASE login event.  1 is an application/vendor generated event lower into the application.  Each event, 45 and 1, has useful information.  Event=45, which will always generate with the older timestamp, has IP information within the extrainfo field.  Event=1 has the application name and the host PID in the extrainfo field.

I'm looking to merge those two events, with slightly dissimilar timestamps, into a single event where I can display 45's timestamp, 45's database name (SSS_ABC123_DB),  the userid (ch13mhy in both), 1's app_name,  and 1's host_pid

Labels (1)
0 Karma
1 Solution

renjith_nair
Legend

It's easy if you have a common field in both events. For e.g looking at both events, you have the fields with values 191, 873, ch13mhy in common. You may use one of them to stitch the events together.

For e.g assuming the userid field is the common factor between these two

Try

"your base search"|stats max(eval(if(event_number==45,_time,null()))) as _time, values(database_name) as database_name, values(apps_name_ as apps_name, values(host_pid) as host_pid by userid

 

---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

It's easy if you have a common field in both events. For e.g looking at both events, you have the fields with values 191, 873, ch13mhy in common. You may use one of them to stitch the events together.

For e.g assuming the userid field is the common factor between these two

Try

"your base search"|stats max(eval(if(event_number==45,_time,null()))) as _time, values(database_name) as database_name, values(apps_name_ as apps_name, values(host_pid) as host_pid by userid

 

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

CrailAtWork
Engager

Thank you!   This gets me about 95% there.  

I was too wrapped up in bucket and transaction  statements.

0 Karma

renjith_nair
Legend

Glad it worked. Appreciate an upvote (karma) and you may close the question by accepting as a solution 🙂 

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...