Splunk Search

correlate events that matches on time, and ip address

phudinhha
Explorer

I have two indexes.
1- dns log with source IP with _time field
2 - dhcp log with dhcp IP with _time field

I figured out a way to match source IP of DNS Log and source IP of DHCP Log. However, what concerns me is the differences in time between these two indexes. Is there anyway to display the table as DNS_TIME, DHCP TIME (approximately 5m windows different), DHCP_hostname ???

I would really appreciate if anyone could help me with this!

0 Karma

mlf
Path Finder

Sounds like the transaction command with the maxspan option might be what you're after. Without sample logs, it's hard to tell, but something like:

| transaction IP maxspan=5m

might work.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...