<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Find hosts which are not reporting by both hostname or IP in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Find-hosts-which-are-not-reporting-by-both-hostname-or-IP/m-p/388281#M113215</link>
    <description>&lt;P&gt;Hello All&lt;/P&gt;

&lt;P&gt;I originally asked a similar question&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/682992/how-do-i-use-a-comparison-search-to-find-all-devic.html"&gt;https://answers.splunk.com/answers/682992/how-do-i-use-a-comparison-search-to-find-all-devic.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;It did seem to work but, it now seems not to be working.  So here is what I am doing.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Get a list of all hosts and IP in our DMZs that are being report live/active via Qualys scan of our networks&lt;/LI&gt;
&lt;LI&gt;I take results from Qualys scan and place into a lookup file called dmzhosts.csv&lt;/LI&gt;
&lt;LI&gt;I then take the dmzhosts.csv and run a search for hostname or IP address against index=&lt;EM&gt;.  I am doing it this way as due to the fact that not every device that is reporting into Splunk has a universal forwarder. I use the following search:
`index=&lt;/EM&gt; 
[ inputlookup dmzhosts.csv 
| table IP 
| rename IP AS host 
| format] OR 
[ inputlookup dmzhosts.csv 
| table hostname 
| rename hostname AS host 
| format]
| eval host=upper(host)
| stats count by host
| append [inputlookup dmzhosts.csv | eval count=0, hostname=upper(hostname)|rename hostname as host | fields host, count]
| stats sum(count) AS Total by host
| where Total=0
| outputlookup missingdmzhosts.csv`&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;The search is only run over for the last 24 hrs and is ran every morning at 6am.  My issue is that I have actually setup and verified manually several hosts that were missing, these systems are appliances and can only send syslog, but again I have verified that I see their logs in Splunk.  But my search still shows them as missing dmz hosts.&lt;/P&gt;

&lt;P&gt;any help would be appreciated.&lt;/P&gt;

&lt;P&gt;thanks&lt;BR /&gt;
ed&lt;/P&gt;</description>
    <pubDate>Mon, 19 Nov 2018 17:26:39 GMT</pubDate>
    <dc:creator>edwardrose</dc:creator>
    <dc:date>2018-11-19T17:26:39Z</dc:date>
    <item>
      <title>Find hosts which are not reporting by both hostname or IP</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Find-hosts-which-are-not-reporting-by-both-hostname-or-IP/m-p/388281#M113215</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;

&lt;P&gt;I originally asked a similar question&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/682992/how-do-i-use-a-comparison-search-to-find-all-devic.html"&gt;https://answers.splunk.com/answers/682992/how-do-i-use-a-comparison-search-to-find-all-devic.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;It did seem to work but, it now seems not to be working.  So here is what I am doing.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Get a list of all hosts and IP in our DMZs that are being report live/active via Qualys scan of our networks&lt;/LI&gt;
&lt;LI&gt;I take results from Qualys scan and place into a lookup file called dmzhosts.csv&lt;/LI&gt;
&lt;LI&gt;I then take the dmzhosts.csv and run a search for hostname or IP address against index=&lt;EM&gt;.  I am doing it this way as due to the fact that not every device that is reporting into Splunk has a universal forwarder. I use the following search:
`index=&lt;/EM&gt; 
[ inputlookup dmzhosts.csv 
| table IP 
| rename IP AS host 
| format] OR 
[ inputlookup dmzhosts.csv 
| table hostname 
| rename hostname AS host 
| format]
| eval host=upper(host)
| stats count by host
| append [inputlookup dmzhosts.csv | eval count=0, hostname=upper(hostname)|rename hostname as host | fields host, count]
| stats sum(count) AS Total by host
| where Total=0
| outputlookup missingdmzhosts.csv`&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;The search is only run over for the last 24 hrs and is ran every morning at 6am.  My issue is that I have actually setup and verified manually several hosts that were missing, these systems are appliances and can only send syslog, but again I have verified that I see their logs in Splunk.  But my search still shows them as missing dmz hosts.&lt;/P&gt;

&lt;P&gt;any help would be appreciated.&lt;/P&gt;

&lt;P&gt;thanks&lt;BR /&gt;
ed&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:26:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Find-hosts-which-are-not-reporting-by-both-hostname-or-IP/m-p/388281#M113215</guid>
      <dc:creator>edwardrose</dc:creator>
      <dc:date>2018-11-19T17:26:39Z</dc:date>
    </item>
  </channel>
</rss>

