Splunk Search

correlate events that matches on time, and ip address

phudinhha
Explorer

I have two indexes.
1- dns log with source IP with _time field
2 - dhcp log with dhcp IP with _time field

I figured out a way to match source IP of DNS Log and source IP of DHCP Log. However, what concerns me is the differences in time between these two indexes. Is there anyway to display the table as DNS_TIME, DHCP TIME (approximately 5m windows different), DHCP_hostname ???

I would really appreciate if anyone could help me with this!

0 Karma

mlf
Path Finder

Sounds like the transaction command with the maxspan option might be what you're after. Without sample logs, it's hard to tell, but something like:

| transaction IP maxspan=5m

might work.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...