<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search That Looks Back in Time and Checks Fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513345#M144026</link>
    <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/201110"&gt;@niketn&lt;/a&gt;&amp;nbsp;.&amp;nbsp; Both sourcetypes have the same fields, (field 1, field 2, field 3).&amp;nbsp; I need to know when they also have the same values.&amp;nbsp; This is for a security alert.&amp;nbsp; The alert should search for the three fields in sourcetype "a" then look back in time from that point back 5 minutes (-5m@m to now) for the same fields and values in sourcetype "b".&amp;nbsp; If the same fields and values are found, then no alert should fire.&amp;nbsp; If the same fields and values are not found, then an alert should fire with the data from sourcetype "a" (field 1, field 2, field 3).&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 10 Aug 2020 13:36:03 GMT</pubDate>
    <dc:creator>jodros</dc:creator>
    <dc:date>2020-08-10T13:36:03Z</dc:date>
    <item>
      <title>Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513104#M143962</link>
      <description>&lt;P&gt;I need assistance building a search that looks back in time 5 minutes to check and see if fields are present.&amp;nbsp; If so I do not need it to return any results.&amp;nbsp; This is correlating two different security logs&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;sourcetype=a field=1 field=2 field=3 is used to look back 5 minutes against&amp;nbsp;&lt;/P&gt;&lt;P&gt;sourcetype=b field=1 field=2 field=3&lt;/P&gt;&lt;P&gt;If there is a match, return no results.&amp;nbsp; If no match, return sourcetype=a field=1 field=2 field=3 results.&lt;/P&gt;&lt;P&gt;Any assistance would be appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 21:34:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513104#M143962</guid>
      <dc:creator>jodros</dc:creator>
      <dc:date>2020-08-07T21:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513192#M143979</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1886"&gt;@jodros&lt;/a&gt;&amp;nbsp;please add more relevant details. Do you want to correlate based on field names or values of the fields? i.e. field1, field2 and field3 to be present in the event? Or for field1=&amp;lt;value1&amp;gt;,&amp;nbsp;field2=&amp;lt;value2&amp;gt; and&amp;nbsp;field3=&amp;lt;value3&amp;gt; you want to correlate when the values value1, value2 and value3 are the same for the three fields? Please add some sample cooked up data for the two events and the final expected output so that the community can assist you better!&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 07:11:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513192#M143979</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-08-09T07:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513345#M144026</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/201110"&gt;@niketn&lt;/a&gt;&amp;nbsp;.&amp;nbsp; Both sourcetypes have the same fields, (field 1, field 2, field 3).&amp;nbsp; I need to know when they also have the same values.&amp;nbsp; This is for a security alert.&amp;nbsp; The alert should search for the three fields in sourcetype "a" then look back in time from that point back 5 minutes (-5m@m to now) for the same fields and values in sourcetype "b".&amp;nbsp; If the same fields and values are found, then no alert should fire.&amp;nbsp; If the same fields and values are not found, then an alert should fire with the data from sourcetype "a" (field 1, field 2, field 3).&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 13:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513345#M144026</guid>
      <dc:creator>jodros</dc:creator>
      <dc:date>2020-08-10T13:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513346#M144027</link>
      <description>&lt;P&gt;I think I have found a way to get this working with a lookup file, but I would rather not use that method.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 13:37:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513346#M144027</guid>
      <dc:creator>jodros</dc:creator>
      <dc:date>2020-08-10T13:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513597#M144113</link>
      <description>&lt;P&gt;I am trying something like this, but it is not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(sourcetype=apple action=blocked)  | append [ search sourcetype=banana | rename source as bsource destination as bdestination url as burl] | eval contained = if(bsource != source, "false", if(bdestination != destination, "false", if(burl != url, "false", "true"))) | table bsource bdestination burl | where contained = false&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any help would be appreciated.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 15:56:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513597#M144113</guid>
      <dc:creator>jodros</dc:creator>
      <dc:date>2020-08-11T15:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513628#M144133</link>
      <description>&lt;P&gt;I think I got this working with transactions.&amp;nbsp; Let me know if this is the best way or if there is a more cpu friendly way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(sourcetype=apple action=blocked) OR (sourcetype=banana) 
| eval Stuff=coalesce(stuffa,stuffb) 
| transaction source destination Stuff url startswith="word" endswith="anotherword" keepevicted=true maxevents=2 
| search sourcetype=banana closed_txn=0 
| table _time source destination Stuff url&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 20:54:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513628#M144133</guid>
      <dc:creator>jodros</dc:creator>
      <dc:date>2020-08-11T20:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Search That Looks Back in Time and Checks Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513660#M144145</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1886"&gt;@jodros&lt;/a&gt;&amp;nbsp;stats might be better way, but community would be able to assist better if you can provide some cooked up dummy data for events containing &lt;STRONG&gt;word&lt;/STRONG&gt; and &lt;STRONG&gt;anotherword&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are several examples on community for such kind of use case with stats as an alternative for transaction.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 03:38:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-That-Looks-Back-in-Time-and-Checks-Fields/m-p/513660#M144145</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-08-12T03:38:19Z</dc:date>
    </item>
  </channel>
</rss>

