Splunk Search

correlate 2 events

roopeshetty
Path Finder

Hi Guys,

We will have 2 events within a fraction of 3- 4 seconds when ever a user fail to login to our application as below;

2019-12-23 08:03:10 192.168.57.88 - 10.10.10.1 USER Peter profileID 1d48057e-1115-4254-981d-c789f7f47ca4 -
2019-12-23 08:03:13 192.168.57.88 - 10.10.10.1 LoginFailed profileID 1d48057e-1115-4254-981d-c789f7f47ca4 –

Here USER names will be logged in the first event and the Login Status as LoginFailed will be logged in second event. Hence, we are struggling to create the alerts or dashboards which contains the USER names along with the Login Status when the Login failures happens. Can some one please provide us the query which will join or correlate above 2 lines and show the output with USER name as well Login Status.
Please note that we can use the ProfileID as the common factor between these 2 events as this will be same in both the events for a user.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try ... | stats latest(_time) as _time, values(*) as * by profileID | table _time USER profileID LoginStatus.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...