Splunk Search

Transaction with field from a lookup

mpuigmal
New Member

Hi,

I'm trying to correlate events from 2 different sourcetypes. The “correlation field” is the user email address.
We have the email address under ‘user’ field in the ‘Logs‘ sourcetype but we do not have it in ‘Session’ Logs.
To retrieve the user email from Session Logs, I use a lookup table.
I’ve built the following search :

(sourcetype=Session) OR (sourcetype=Logs AUTH_Status=AUTHN_METHOD_SUCCESS) | lookup UserList sAMAccountName as AccountName OUTPUT userPrincipalName as user | transaction user, startswith="AUTHN_METHOD_SUCCESS" endswith=",Online," maxspan=10m | table user, duration, _time, sourcetype

It seems that the transaction is not done on the field ‘user’ (I can see that in the results).
Does the transaction command support data that comes from a lookup table?
Maybe I miss something else?

Thanks for your help

Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Assuming the Session sourcetype does not have field sAMAccountName then the lookup command will not find a match and may be replacing the user field with null. Replacing OUTPUT with OUTPUTNEW may help.

Another approach would be a join:

(sourcetype=Session) | join user [sourcetype=Logs AUTH_Status=AUTHN_METHOD_SUCCESS) | lookup UserList sAMAccountName as AccountName OUTPUT userPrincipalName as user] | ...
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...