Splunk Search

Transacting Events Across Different Field Names

joshwilczek
New Member

i'm using transact to group logon events on windows by Logon_ID. On Windows 10, there's also a Linked_Logon_ID that links to a Logon_ID. Is it possible to join these events somehow (without renaming a field and doing another transact)?

0 Karma

brendanmatthews
Explorer

You can do something like (for the sake of the example I am going to assume your field names are Linked_Logon_ID and Logon_ID) ...|eval Shared_Logon_ID=case( searchmatch("Linked_Logon_ID") , Linked_Logon_ID , searchmatch("Logon_ID") , Logon_ID) | transaction Shared_Logon_ID ...Both types of events will now have the common field name and will be grouped together by transaction. Hope this helps.

0 Karma

DalJeanis
Legend

Please edit your post to provide details on the specific events to be connected, what the keys are, and so on, including your current SPL. Use the code button "101 010" to mark the code, so the splunk web spider will not eat it. (other methods include putting four spaces before each line and a blank line before and after, or surrounding it by grave accents (the one under the tilde on an american keyboard).

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...