Splunk Search

correlate events that matches on time, and ip address

phudinhha
Explorer

I have two indexes.
1- dns log with source IP with _time field
2 - dhcp log with dhcp IP with _time field

I figured out a way to match source IP of DNS Log and source IP of DHCP Log. However, what concerns me is the differences in time between these two indexes. Is there anyway to display the table as DNS_TIME, DHCP TIME (approximately 5m windows different), DHCP_hostname ???

I would really appreciate if anyone could help me with this!

0 Karma

mlf
Path Finder

Sounds like the transaction command with the maxspan option might be what you're after. Without sample logs, it's hard to tell, but something like:

| transaction IP maxspan=5m

might work.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...