<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query on Data models in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Query-on-Data-models/m-p/491512#M8354</link>
    <description>&lt;P&gt;HI Team,&lt;BR /&gt;
I have query regarding Data models base search&lt;/P&gt;

&lt;P&gt;| multisearch [| from datamodel:Endpoint.Filesystem | search tag="change"  ] [| from datamodel:Endpoint.Registry | search tag="change"  ] [| from datamodel:Change.Endpoint_Changes | search  ] | head 100&lt;/P&gt;

&lt;P&gt;Above is the query for "Recent Endpoint Changes" in Endpoint Changes Dashboard (Splunk Enterprise Security (Endpoint Security Domain))&lt;/P&gt;

&lt;P&gt;Now query refers to Endpoint.Filesystem data model. This data model includes &lt;CODE&gt;cim_Endpoint_indexes&lt;/CODE&gt; macros which refers to index=crowstrike in my environment and 2 tags as tag=filesystem and tag=endpoint. These tags are filled with eventtypes where sourcetypes are specified. Now one of the eventtype refers to sourcetype  as aws:cloudtrail. &lt;/P&gt;

&lt;P&gt;And whatever result i am getting for above query is related to aws:cloudtrail only. &lt;/P&gt;

&lt;P&gt;Now my understanding is when you are referring to data model in your query then it should gives you results from specified index and in this case index=crowdstrike sourcetype=aws:cloudtrail is invalid but still above search is populating results in dashboard&lt;/P&gt;

&lt;P&gt;In short data models base search is not fulfilling the specified fields but still results are getting populated&lt;/P&gt;

&lt;P&gt;Could you please correct my understandings.&lt;/P&gt;</description>
    <pubDate>Sun, 26 Jan 2020 14:11:18 GMT</pubDate>
    <dc:creator>xoriantkbisht</dc:creator>
    <dc:date>2020-01-26T14:11:18Z</dc:date>
    <item>
      <title>Query on Data models</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Query-on-Data-models/m-p/491512#M8354</link>
      <description>&lt;P&gt;HI Team,&lt;BR /&gt;
I have query regarding Data models base search&lt;/P&gt;

&lt;P&gt;| multisearch [| from datamodel:Endpoint.Filesystem | search tag="change"  ] [| from datamodel:Endpoint.Registry | search tag="change"  ] [| from datamodel:Change.Endpoint_Changes | search  ] | head 100&lt;/P&gt;

&lt;P&gt;Above is the query for "Recent Endpoint Changes" in Endpoint Changes Dashboard (Splunk Enterprise Security (Endpoint Security Domain))&lt;/P&gt;

&lt;P&gt;Now query refers to Endpoint.Filesystem data model. This data model includes &lt;CODE&gt;cim_Endpoint_indexes&lt;/CODE&gt; macros which refers to index=crowstrike in my environment and 2 tags as tag=filesystem and tag=endpoint. These tags are filled with eventtypes where sourcetypes are specified. Now one of the eventtype refers to sourcetype  as aws:cloudtrail. &lt;/P&gt;

&lt;P&gt;And whatever result i am getting for above query is related to aws:cloudtrail only. &lt;/P&gt;

&lt;P&gt;Now my understanding is when you are referring to data model in your query then it should gives you results from specified index and in this case index=crowdstrike sourcetype=aws:cloudtrail is invalid but still above search is populating results in dashboard&lt;/P&gt;

&lt;P&gt;In short data models base search is not fulfilling the specified fields but still results are getting populated&lt;/P&gt;

&lt;P&gt;Could you please correct my understandings.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2020 14:11:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Query-on-Data-models/m-p/491512#M8354</guid>
      <dc:creator>xoriantkbisht</dc:creator>
      <dc:date>2020-01-26T14:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Query on Data models</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Query-on-Data-models/m-p/491513#M8355</link>
      <description>&lt;P&gt;Datamodels can contain data from multiple indexes. They're not restricted to a single index or sourcetype.&lt;/P&gt;

&lt;P&gt;You can easily find all the indexes and sourcetypes associated with a given datamodel with the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count from datamodel=your_datamodel_name by index, sourcetype
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 07 Feb 2020 18:20:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Query-on-Data-models/m-p/491513#M8355</guid>
      <dc:creator>codebuilder</dc:creator>
      <dc:date>2020-02-07T18:20:04Z</dc:date>
    </item>
  </channel>
</rss>

