Hi @trazomtg , as the others already said, in Splunk, you can correlate events from the same or different data sources, even if etherogenous or different. The rule to create a correlation search, is to identify the correlation key, in other words the fields to use to correlate the different events. We could help you, but it's mandatory to have more details about the data flows to correlate. as an exmple, you could correlate access logs to a windows server with an entrance badge, so if in windows the login is recognized by user and EventCode=4624 and e.g. in the entrance badge the user field is username and the action is action="access", you could create a search like the following: (index=wineventlog EventCode=4624) OR (index=entrance_badge action="access")
| user=coalesce(user,username)
| stats
earliest(eval(if(index=wineventlog,_time,""))) AS wineventlog_time
earliest(eval(if(index=entrance_badge,_time,""))) AS entrance_badge_time
dc(index) AS index_count
BY user
| eval
wineventlog_time=strftime(wineventlog_time,"%Y-%m-%d %H:%M:%S"),
entrance_badge_time=strftime(entrance_badge_time,"%Y-%m-%d %H:%M:%S") In this way, you can check that a user is present in the office when accessed a server. Ciao. Giuseppe
... View more