<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Events where a value is missing in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507167#M2381</link>
    <description>&lt;P&gt;You are using the transaction command, which can have memory issues for long running transactions. From your solution, it looks like you're expecting Symantec Endpoint Protection to touch base every minute. An alternative approach avoiding the transaction command could be&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="WMI:Service"
| bin _time span=1m
| stats values(Caption) as Captions by _time host
| where isnull(mvfind(Captions,"Symantec Endpoint Protection"))&lt;/LI-CODE&gt;&lt;P&gt;which is asking to find all Captions for a host per minute, where there is no Symantec Endpoint Protection&lt;/P&gt;&lt;P&gt;it then will show you the Captions for that host within that minute for all minutes where there was no reqiured Caption.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jul 2020 01:08:38 GMT</pubDate>
    <dc:creator>bowesmana</dc:creator>
    <dc:date>2020-07-03T01:08:38Z</dc:date>
    <item>
      <title>Events where a value is missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/506971#M2347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to use Splunk to provide a report on servers where a service is absent. So I have one event per service per host. So if there are 10 services running on 1 host, that is 10 different events. My idea was to do a search which combines all of the services on a host into a single field and then search where that field doesn't contain the value I am looking for, but I have no idea how to achieve this.&lt;/P&gt;&lt;P&gt;Here are a couple of sample raw events from the same host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;20200702162757.583428
Caption=Remote Desktop Configuration
Description=Remote Desktop Configuration service (RDCS) is responsible for all Remote Desktop Services and Remote Desktop related configuration and session maintenance activities that require SYSTEM context. These include per-session temporary folders, RD themes, and RD certificates.
Name=SessionEnv
PathName=C:\WINDOWS\System32\svchost.exe -k netsvcs
StartMode=Manual
StartName=localSystem
State=Running
Status=OK
wmi_type=Service

20200702162757.583428
Caption=Symantec Endpoint Protection WSC Service
Description=Allows Symantec Endpoint Protection to report status to the Windows Security Center.
Name=sepWscSvc
PathName="C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\14.3.558.0000.105\Bin64\sepWscSvc64.exe"
StartMode=Auto
StartName=LocalSystem
State=Running
Status=OK
wmi_type=Service&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Assume I want to return hosts where the second service entry is absent.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 06:40:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/506971#M2347</guid>
      <dc:creator>jeremyhagand61</dc:creator>
      <dc:date>2020-07-02T06:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Events where a value is missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/506984#M2351</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/78496"&gt;@jeremyhagand61&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;We need to have a master set to compare against the events to find the "missing" service. Lookup is one of the most used method used in these cases.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a lookup file with the server and service combination&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;server,service
host1,service1
host1,service2
host1,service3
host2,service1
host2,service2
host2,service3
host3,service1
host3,service2
host3,service3&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Compare against that with the events&lt;/LI&gt;&lt;LI&gt;Find the missing entries&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="your index" "other search parameters"
|stats count by server,service
|inputlookup servers.csv append=true| fillnull count
|stats sum(count) as count by server,service&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For those who have 0 count is missing one or more services&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;where count &amp;lt; 1&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 02 Jul 2020 07:46:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/506984#M2351</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2020-07-02T07:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Events where a value is missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507161#M2379</link>
      <description>&lt;P&gt;I actually managed to solve this as follows:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="WMI:Service"
| dedup host Caption
| transaction maxspan=60m host
| table host,Caption
| regex Caption!="Symantec Endpoint Protection"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 02 Jul 2020 23:36:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507161#M2379</guid>
      <dc:creator>jeremyhagand61</dc:creator>
      <dc:date>2020-07-02T23:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Events where a value is missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507163#M2380</link>
      <description>&lt;P&gt;I have tweaked this slightly to make it better.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="WMI:Service"
| transaction maxspan=1m host
| dedup host,Caption
| regex Caption!="Symantec Endpoint Protection"
| table host,Caption&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 02 Jul 2020 23:59:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507163#M2380</guid>
      <dc:creator>jeremyhagand61</dc:creator>
      <dc:date>2020-07-02T23:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Events where a value is missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507167#M2381</link>
      <description>&lt;P&gt;You are using the transaction command, which can have memory issues for long running transactions. From your solution, it looks like you're expecting Symantec Endpoint Protection to touch base every minute. An alternative approach avoiding the transaction command could be&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="WMI:Service"
| bin _time span=1m
| stats values(Caption) as Captions by _time host
| where isnull(mvfind(Captions,"Symantec Endpoint Protection"))&lt;/LI-CODE&gt;&lt;P&gt;which is asking to find all Captions for a host per minute, where there is no Symantec Endpoint Protection&lt;/P&gt;&lt;P&gt;it then will show you the Captions for that host within that minute for all minutes where there was no reqiured Caption.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jul 2020 01:08:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Events-where-a-value-is-missing/m-p/507167#M2381</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2020-07-03T01:08:38Z</dc:date>
    </item>
  </channel>
</rss>

