<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Combining Searches from Multiple Sourcetypes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523890#M147802</link>
    <description>&lt;P&gt;Thanks! Was able to finish the final search:&lt;/P&gt;&lt;P&gt;(index=windows OR index=_internal) (source="WinEventLog:Security" (EventCode="1105" OR EventCode="1102") OR (source=*metrics.log group=tcpin_connections earliest=-2d@d arch=x64)) OR sourcetype="Symantec:VirusDefs" OR sourcetype="PowerShell:WinSystemInfo" NOT PS_SN="VMware-*" | eval age = (now() - _time ) | stats latest(PS_OS_Version) as OSVersion latest(PS_W10_Build) as W10Build latest(PS_Manufac) as Manufac latest(PS_Model) as Model latest(PS_SN) as SN latest(PS_AV_Date) as AVDate latest(PS_BitLocker) as BitLocker latest(eval(if(EventCode="1105",Date,NULL))) as LastSecLogArchive latest(eval(if(EventCode="1102",Date,NULL))) as LastSecLogClear max(_time) as LastActive min(age) as age by host | convert ctime(LastActive) as "UF Last Active On" | eval Status=case(age &amp;lt; 1800,"Running",age &amp;gt; 1800,"DOWN") | rename Status as "UF Status" | table host,OSVersion,W10Build,AVDate,BitLocker,LastSecLogArchive,LastSecLogClear,"UF Status","UF Last Active On",Manufac,Model,SN&lt;/P&gt;</description>
    <pubDate>Fri, 09 Oct 2020 11:11:45 GMT</pubDate>
    <dc:creator>m314219</dc:creator>
    <dc:date>2020-10-09T11:11:45Z</dc:date>
    <item>
      <title>Combining Searches from Multiple Sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523064#M147533</link>
      <description>&lt;P&gt;Looking for some advice on combining searches from multiple sourcetypes into a single report for my auditing team. They have requested a report showing hostnames and for each host the current AV definitions, the last time the sec log was cleared or archived, and then content from a couple of text files that is produced by some scheduled tasks on the systems. I currently have all of this info in Splunk, but will need to create a single report to show it all. As an example, how could I take the three queries I've put together so far into the same report?&lt;/P&gt;&lt;P&gt;index=windows source="WinEventLog:Security" EventCode="1105" | rename Date as LastSecLogArchive | stats latest(LastSecLogArchive) by host&lt;/P&gt;&lt;P&gt;index=windows sourcetype="Symantec:VirusDefs" | stats latest(CurrDefs) by host&lt;/P&gt;&lt;P&gt;index=windows source="WinEventLog:Security" EventCode="1102" | rename Date as LastSecLogClear | stats latest(LastSecLogClear) by host&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 19:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523064#M147533</guid>
      <dc:creator>m314219</dc:creator>
      <dc:date>2020-10-05T19:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Combining Searches from Multiple Sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523075#M147539</link>
      <description>&lt;P&gt;index=windows (source="WinEventLog:Security" (EventCode="1105" OR EventCode="1102" ) ) OR&amp;nbsp;sourcetype="Symantec:VirusDefs" | stats latest(eval(if(EventCode="1105",&amp;nbsp; Date,NULL))) as&amp;nbsp;LastSecLogArchive&amp;nbsp; &amp;nbsp; latest(eval(if(EventCode="1102",&amp;nbsp; Date,NULL))) as LastSecLogClear&amp;nbsp; latest(CurrDefs) as CurrDefs by host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 21:39:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523075#M147539</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-10-05T21:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Combining Searches from Multiple Sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523105#M147545</link>
      <description>&lt;P&gt;Thanks! How would you add in another search like this?&lt;/P&gt;&lt;P&gt;index=_internal source=*metrics.log group=tcpin_connections earliest=-2d@d arch=x64 | eval age = (now() - _time ) | stats min(age) as age, max(_time) as LastTime by hostname | convert ctime(LastTime) as "UF Last Active On" | eval Status=case(age &amp;lt; 1800,"Running",age &amp;gt; 1800,"DOWN") | rename Status as "UF Status" | table hostname,"UF Status","UF Last Active On"&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 03:59:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523105#M147545</guid>
      <dc:creator>m314219</dc:creator>
      <dc:date>2020-10-06T03:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Combining Searches from Multiple Sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523386#M147610</link>
      <description>&lt;P&gt;I'm not sure what you want to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows (source="WinEventLog:Security" (EventCode="1105" OR EventCode="1102" ) ) OR sourcetype="Symantec:VirusDefs" 
| stats latest(eval(if(EventCode="1105", Date,NULL))) as LastSecLogArchive ,latest(eval(if(EventCode="1102", Date,NULL))) as LastSecLogClear ,latest(CurrDefs) as CurrDefs by host
| join host [search index=_internal source=*metrics.log group=tcpin_connections earliest=-2d@d arch=x64 | eval age = (now() - _time ) | stats min(age) as age, max(_time) as LastTime by hostname | convert ctime(LastTime) as "UF Last Active On" | eval Status=case(age &amp;lt; 1800,"Running",age &amp;gt; 1800,"DOWN") | rename Status as "UF Status" | table hostname,"UF Status","UF Last Active On" |rename hostname as host]&lt;/LI-CODE&gt;&lt;P&gt;like this?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 10:23:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523386#M147610</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-10-07T10:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Combining Searches from Multiple Sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523890#M147802</link>
      <description>&lt;P&gt;Thanks! Was able to finish the final search:&lt;/P&gt;&lt;P&gt;(index=windows OR index=_internal) (source="WinEventLog:Security" (EventCode="1105" OR EventCode="1102") OR (source=*metrics.log group=tcpin_connections earliest=-2d@d arch=x64)) OR sourcetype="Symantec:VirusDefs" OR sourcetype="PowerShell:WinSystemInfo" NOT PS_SN="VMware-*" | eval age = (now() - _time ) | stats latest(PS_OS_Version) as OSVersion latest(PS_W10_Build) as W10Build latest(PS_Manufac) as Manufac latest(PS_Model) as Model latest(PS_SN) as SN latest(PS_AV_Date) as AVDate latest(PS_BitLocker) as BitLocker latest(eval(if(EventCode="1105",Date,NULL))) as LastSecLogArchive latest(eval(if(EventCode="1102",Date,NULL))) as LastSecLogClear max(_time) as LastActive min(age) as age by host | convert ctime(LastActive) as "UF Last Active On" | eval Status=case(age &amp;lt; 1800,"Running",age &amp;gt; 1800,"DOWN") | rename Status as "UF Status" | table host,OSVersion,W10Build,AVDate,BitLocker,LastSecLogArchive,LastSecLogClear,"UF Status","UF Last Active On",Manufac,Model,SN&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 11:11:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-Searches-from-Multiple-Sourcetypes/m-p/523890#M147802</guid>
      <dc:creator>m314219</dc:creator>
      <dc:date>2020-10-09T11:11:45Z</dc:date>
    </item>
  </channel>
</rss>

