<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating Indirect / Cascading Search in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114862#M1712</link>
    <description>&lt;P&gt;Name of CAS servers will be a static value?&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jun 2014 12:56:49 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2014-06-24T12:56:49Z</dc:date>
    <item>
      <title>Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114860#M1710</link>
      <description>&lt;P&gt;Hi Splunk Community,&lt;/P&gt;

&lt;P&gt;I have, I would hope to be, a simple question.&lt;/P&gt;

&lt;P&gt;Our company has always monitored domain account lockouts, but recently we wanted to take it a bit further, and monitor IIS logs for potential lockouts attempted to authenticate against our Exchange CAS servers.&lt;/P&gt;

&lt;P&gt;Therefore, our main real-time search script is as such:&lt;/P&gt;

&lt;P&gt;index!=_audit EventCode=4740 | table _time, EventCodeDescription, Account_Name, Security_ID, Account_Domain, Caller_Computer_Name,  | eval _time=strftime(_time, "%H:%M:%S %m-%d-%y") | fields - _raw | rename _time AS When?, Message AS Who?_Where?&lt;/P&gt;

&lt;P&gt;I had an idea that, instead of going through the hassle of associating fields between WinEventLog:Security and iis to figure out why someone would get locked out on our CAS server, it would be more efficient to generate a report of the past 10minutes (give or take 3minutes haven't decided on that), for sc_win32_status=1326 (bad username or password from iis).&lt;/P&gt;

&lt;P&gt;Script below:&lt;/P&gt;

&lt;P&gt;sourcetype="iis" sc_win32_status=1326 | eval username=lower(cs_username) | fillnull | stats count by username, cs_uri_stem, cs_User_Agent | where count&amp;gt;1 AND count&amp;lt;6 | sort by count desc&lt;/P&gt;

&lt;P&gt;My goal would be to generate this IIS report when the Caller_Computer_Name is equal to the name of one of our CAS servers when the EventCode=4740 alert is thrown.&lt;/P&gt;

&lt;P&gt;Is there a way to achieve this?&lt;/P&gt;

&lt;P&gt;Thank you in advance,&lt;BR /&gt;
Daniel&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:54:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114860#M1710</guid>
      <dc:creator>dscoland</dc:creator>
      <dc:date>2020-09-28T16:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114861#M1711</link>
      <description>&lt;P&gt;Is this possible with using the Python SDK?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 12:45:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114861#M1711</guid>
      <dc:creator>dscoland</dc:creator>
      <dc:date>2014-06-24T12:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114862#M1712</link>
      <description>&lt;P&gt;Name of CAS servers will be a static value?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 12:56:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114862#M1712</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-06-24T12:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114863#M1713</link>
      <description>&lt;P&gt;There will be multiple CAS servers, but all of them will have a static name.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 12:58:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114863#M1713</guid>
      <dc:creator>dscoland</dc:creator>
      <dc:date>2014-06-24T12:58:34Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114864#M1714</link>
      <description>&lt;P&gt;You can look at the 'map' command using which you can run a search based on the search result of another search.&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Map"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Map&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Its should be basically something like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index!=_audit EventCode=4740 Caller_Computer_Name="YourCASServerName"| stats count | where count &amp;gt; 0 | map [search sourcetype="iis" sc_win32_status=1326 | eval username=lower(cs_username) | fillnull | stats count by username, cs_uri_stem, cs_User_Agent | where count&amp;gt;1 AND count&amp;lt;6 | sort by count desc]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 24 Jun 2014 13:17:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114864#M1714</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-06-24T13:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114865#M1715</link>
      <description>&lt;P&gt;Wow, dude.  I didn't know that the map command was there.  Does that mean you can ma multiple searchs, or just one?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 13:33:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114865#M1715</guid>
      <dc:creator>dscoland</dc:creator>
      <dc:date>2014-06-24T13:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114866#M1716</link>
      <description>&lt;P&gt;Its basically for each search result in base search,  you can run the subsearch specified in map command (that's why I used stats to limit base search results to 1). You can't map multiple searches directly but there are workarounds.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 13:45:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114866#M1716</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-06-24T13:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Indirect / Cascading Search</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114867#M1717</link>
      <description>&lt;P&gt;It looks like this can't be run as a real-time alert because it will alert every time that there is a match in the subsearch.  Is that a bug?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2014 13:53:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Indirect-Cascading-Search/m-p/114867#M1717</guid>
      <dc:creator>dscoland</dc:creator>
      <dc:date>2014-06-24T13:53:15Z</dc:date>
    </item>
  </channel>
</rss>

