<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Optimize my search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525468#M148298</link>
    <description>&lt;P&gt;Thanks so much&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/205010"&gt;@Richfez&lt;/a&gt;&amp;nbsp; you have been a great help.&lt;/P&gt;&lt;P&gt;Take care.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Oct 2020 22:31:26 GMT</pubDate>
    <dc:creator>Mai_splunk</dc:creator>
    <dc:date>2020-10-19T22:31:26Z</dc:date>
    <item>
      <title>Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525458#M148291</link>
      <description>&lt;DIV&gt;&lt;DIV class="tw-menu"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;Hi team!&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;How can I optimize the following search?&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;I want to find ips that have made an attack and have been blocked by the UTM but that have registered any allowed connection.&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;&lt;EM&gt;index=xxxx type=utm action=blocked | table srcip | join type=inner [search index=xxxx type=traffic action=allowed] | stats count by srcip&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tw-menu"&gt;Thanks in advance!&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 19 Oct 2020 21:12:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525458#M148291</guid>
      <dc:creator>Mai_splunk</dc:creator>
      <dc:date>2020-10-19T21:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525460#M148292</link>
      <description>&lt;P&gt;&lt;EM&gt;index=xxxx ( type=utm action=blocked ) OR ( type=traffic action=allowed )| stats count dc(action) as flag by srcip | where flag=2&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 21:28:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525460#M148292</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-10-19T21:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525461#M148293</link>
      <description>&lt;P&gt;It could be as simple as this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fw ((type=utm action=blocked) OR (type=traffic action=allowed)) | stats count by srcip&lt;/LI-CODE&gt;&lt;P&gt;But probably you'll want something a bit more like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fw ((type=utm action=blocked) OR (type=traffic action=allowed)) 
| stats dc(action) as has_both by srcip 
| search has_both&amp;gt;1 &lt;/LI-CODE&gt;&lt;P&gt;There's actually more possible optimization (especially if srcip is an index time field), but that's going to cut nine hundred percent off your search, I would think, and nine million percent off the search if it's actually *big*.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 21:31:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525461#M148293</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2020-10-19T21:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525465#M148296</link>
      <description>&lt;P&gt;Thanks so much, it's exactly that i want!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;One more doubt, now, How I can reduce the serarch only a public IP? I'm trying this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;srcip!="10.*" AND srcip&amp;lt;"172.16.*" AND srcip&amp;gt;"172.31.*" AND srcip!="192.168.*" &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;but in the 3th parameter i get any results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 22:08:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525465#M148296</guid>
      <dc:creator>Mai_splunk</dc:creator>
      <dc:date>2020-10-19T22:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525467#M148297</link>
      <description>&lt;P&gt;I'd use CIDR notation and see if it gets you farther:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;srcip=10.0.0.0/8 OR srcip=172.16.0.0/16&lt;/LI-CODE&gt;&lt;P&gt;If you want ONLY public IPs, it'd be something like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;srcip!=10.0.0.0/8 AND srcip!=172.16.0.0/12 AND srcip!=192.168.0.0/16 &lt;/LI-CODE&gt;&lt;P&gt;That should work.&amp;nbsp; I don't believe wildcards and quotes trigger the real CIDR ... "stuff" in Splunk to search on, but the above should do it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 22:25:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525467#M148297</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2020-10-19T22:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: Optimize my search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525468#M148298</link>
      <description>&lt;P&gt;Thanks so much&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/205010"&gt;@Richfez&lt;/a&gt;&amp;nbsp; you have been a great help.&lt;/P&gt;&lt;P&gt;Take care.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 22:31:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Optimize-my-search/m-p/525468#M148298</guid>
      <dc:creator>Mai_splunk</dc:creator>
      <dc:date>2020-10-19T22:31:26Z</dc:date>
    </item>
  </channel>
</rss>

