<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search hosts, Windows updates in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528802#M149302</link>
    <description>&lt;P&gt;I tried this way but I didn't receive any result. I am a newbie in Splunk &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think about this way?:&lt;/P&gt;&lt;P&gt;I can search all events with a successful update using regex search&amp;nbsp;&lt;/P&gt;&lt;P&gt;source="WinEventLog:System" | regex Message = "KB5555555" and for example i receive a few events from two hosts. &lt;STRONG&gt;First question&lt;/STRONG&gt;: How I can create a table with a list of these hosts?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As I guess, then I can't use a search like "source="WinEventLog:System" | regex not Message = "KB5555555"" to find all hosts without this update because this search won't show any events.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm stumped &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Nov 2020 09:32:40 GMT</pubDate>
    <dc:creator>ivan123357</dc:creator>
    <dc:date>2020-11-10T09:32:40Z</dc:date>
    <item>
      <title>Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528559#M149255</link>
      <description>&lt;P&gt;Hello! I am new in Splunk Search.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using this query to find all hosts&amp;nbsp;&lt;SPAN&gt;to which a specific update was installed:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;source="WinEventLog:System" | search "KB4579311" | stats last(Keywords) as lastStatus by _time, host | search lastStatus="Installation, Failure”&lt;/P&gt;&lt;P&gt;But I need a query to find all hosts and create a table with hosts to which this update wasn't installed.&amp;nbsp;&lt;SPAN&gt;It turns out that I need to display all hosts that were not found in the request above. Need help with it. Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 17:08:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528559#M149255</guid>
      <dc:creator>ivan123357</dc:creator>
      <dc:date>2020-11-09T17:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528579#M149261</link>
      <description>&lt;P&gt;Finding something that is not there is not Splunk's strong suit.&amp;nbsp; See this blog entry for a good write-up on it.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.duanewaddle.com/proving-a-negative/" target="_blank"&gt;https://www.duanewaddle.com/proving-a-negative/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:15:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528579#M149261</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-09T18:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528581#M149262</link>
      <description>&lt;P&gt;Thank you for your answer!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If think logically, then I need to display hosts in the logs of which a certain number of updates is NOT found, which I indicate in the search. For example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;source="WinEventLog:System" EventCode=19 | stats by host |where NOT like(Message, " Update_Number"). But this search shows all events without this string(update number) but I need only a list of hosts.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:24:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528581#M149262</guid>
      <dc:creator>ivan123357</dc:creator>
      <dc:date>2020-11-09T18:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528692#M149265</link>
      <description>Hi&lt;BR /&gt;I think this should work&lt;BR /&gt;- get list of all your wndows hosts to lookup (e.g. once a week)&lt;BR /&gt;- query hosts which have this fix applied&lt;BR /&gt;- use previous lookup within above query to get list of nodes which haven’t this fix installed.&lt;BR /&gt;There is quite many examples how this could do.&lt;BR /&gt;r. Ismo</description>
      <pubDate>Mon, 09 Nov 2020 19:29:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528692#M149265</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-11-09T19:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528728#M149267</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;Sounds great. I will try it now.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you give me an example too or a URL to documentation? &lt;SPAN&gt;It would be cool if I had a fewexamples&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 19:51:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528728#M149267</guid>
      <dc:creator>ivan123357</dc:creator>
      <dc:date>2020-11-09T19:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528733#M149271</link>
      <description>This is one version of your challenge &lt;A href="https://community.splunk.com/t5/Getting-Data-In/How-to-create-an-alert-for-the-host-not-sending-data-for-an-hour/m-p/407769" target="_blank"&gt;https://community.splunk.com/t5/Getting-Data-In/How-to-create-an-alert-for-the-host-not-sending-data-for-an-hour/m-p/407769&lt;/A&gt;&lt;BR /&gt;r. Ismo</description>
      <pubDate>Mon, 09 Nov 2020 20:16:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528733#M149271</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-11-09T20:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Search hosts, Windows updates</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528802#M149302</link>
      <description>&lt;P&gt;I tried this way but I didn't receive any result. I am a newbie in Splunk &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think about this way?:&lt;/P&gt;&lt;P&gt;I can search all events with a successful update using regex search&amp;nbsp;&lt;/P&gt;&lt;P&gt;source="WinEventLog:System" | regex Message = "KB5555555" and for example i receive a few events from two hosts. &lt;STRONG&gt;First question&lt;/STRONG&gt;: How I can create a table with a list of these hosts?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As I guess, then I can't use a search like "source="WinEventLog:System" | regex not Message = "KB5555555"" to find all hosts without this update because this search won't show any events.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm stumped &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 09:32:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-hosts-Windows-updates/m-p/528802#M149302</guid>
      <dc:creator>ivan123357</dc:creator>
      <dc:date>2020-11-10T09:32:40Z</dc:date>
    </item>
  </channel>
</rss>

