<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to add device pair requirement to SPL? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419936#M120754</link>
    <description>&lt;P&gt;Oh yeah @jawaharas - we have that.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2019 12:35:45 GMT</pubDate>
    <dc:creator>danielbb</dc:creator>
    <dc:date>2019-08-01T12:35:45Z</dc:date>
    <item>
      <title>How to add device pair requirement to SPL?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419934#M120752</link>
      <description>&lt;P&gt;We have this search which works fine:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| inputlookup critical_cyber_devices.csv 
| join SplunkHost type=outer 
    [| metadata index=&amp;lt;index1&amp;gt; index=&amp;lt;index2&amp;gt; type=hosts 
    | rename totalCount as Count, host as SplunkHost, lastTime as "Last Event" 
    | eval actualhourslag=(now()-'Last Event')/60/60 ] 
| fieldformat "Last Event"=strftime('Last Event', "%c") 
| where actualhourslag&amp;gt;HoursLag 
| stats sum(Count) by SplunkHost
| rename sum(Count) as total
| where total &amp;lt; 10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It detects the devices which are not reporting data. &lt;/P&gt;

&lt;P&gt;However, these devices are paired up, which means that as long as one of them reports data, we are all good. &lt;BR /&gt;
How can we add this pairing requirement to the search?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 19:35:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419934#M120752</guid>
      <dc:creator>danielbb</dc:creator>
      <dc:date>2019-07-31T19:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to add device pair requirement to SPL?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419935#M120753</link>
      <description>&lt;P&gt;Is there any field in 'inputlookup critical_cyber_devices.csv' lookup table that indicates about paired devices?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:32:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419935#M120753</guid>
      <dc:creator>jawaharas</dc:creator>
      <dc:date>2020-09-30T01:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to add device pair requirement to SPL?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419936#M120754</link>
      <description>&lt;P&gt;Oh yeah @jawaharas - we have that.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 12:35:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419936#M120754</guid>
      <dc:creator>danielbb</dc:creator>
      <dc:date>2019-08-01T12:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to add device pair requirement to SPL?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419937#M120755</link>
      <description>&lt;P&gt;I added a &lt;CODE&gt;lookup&lt;/CODE&gt; command at the end -&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | inputlookup critical_cyber_devices.csv 
 | join SplunkHost type=outer 
     [| metadata index=&amp;lt;index1&amp;gt; index=&amp;lt;index2&amp;gt; type=hosts 
     | rename totalCount as Count, host as SplunkHost, lastTime as "Last Event" 
     | eval actualhourslag=(now()-'Last Event')/60/60 ] 
 | fieldformat "Last Event"=strftime('Last Event', "%c") 
 | where actualhourslag&amp;gt;HoursLag 
 | stats sum(Count) by SplunkHost
 | rename sum(Count) as total
 | where total &amp;lt; 10
 | lookup critical_cyber_devices.csv  SplunkHost OUTPUT PairGroup
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This produces an output of the SplunkHost followed by the PairGroup name. So, now, I need to alert only when there are two lines with the same PairGroup value. &lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 20:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419937#M120755</guid>
      <dc:creator>danielbb</dc:creator>
      <dc:date>2019-08-01T20:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to add device pair requirement to SPL?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419938#M120756</link>
      <description>&lt;P&gt;Something like this -&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| search PairGroup!=""
| stats count() by PairGroup
| rename count(total) as Total
| search Total &amp;gt; 1
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 01 Aug 2019 21:23:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-device-pair-requirement-to-SPL/m-p/419938#M120756</guid>
      <dc:creator>danielbb</dc:creator>
      <dc:date>2019-08-01T21:23:37Z</dc:date>
    </item>
  </channel>
</rss>

