<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a correlation search between two different indexes (DHCP and Firewall Data) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/545010#M154335</link>
    <description>&lt;P&gt;Thanks for the guidelines here- I played around with a very basic join command and this resulted in the following:&lt;/P&gt;&lt;P&gt;(index=fortfw) level=warning host="XXXXXXXX" category="Malicious Websites" | rename src as ip | join ip [search index="dhcp"] | stats count by hostname, ip&lt;/P&gt;&lt;P&gt;This seemed to do the trick and I now get my stats that include the hostname.....&lt;/P&gt;</description>
    <pubDate>Tue, 23 Mar 2021 21:36:51 GMT</pubDate>
    <dc:creator>daryllj</dc:creator>
    <dc:date>2021-03-23T21:36:51Z</dc:date>
    <item>
      <title>Creating a correlation search between two different indexes (DHCP and Firewall Data)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/544982#M154329</link>
      <description>&lt;P&gt;Hi all- we want to get a bit more elegant with correlation searching between two different indexes.&amp;nbsp; There seems to be a lot of different approaches, but ultimately this is what we are trying to do:&lt;/P&gt;&lt;P&gt;1) we have a set of events returned from a firewall index search&lt;/P&gt;&lt;P&gt;EXAMPLE:&amp;nbsp;&amp;nbsp;&amp;nbsp;(index=XXXXXX) level=warning host="XXXXXXXX" category="Malicious Websites" | stats count by srcip&lt;/P&gt;&lt;P&gt;2) we have the record of the IP in question in our DHCP index:&lt;/P&gt;&lt;P&gt;EXAMPLE:&amp;nbsp;&amp;nbsp;index="dhcp" host="XXXXXXXX" | stats count by ip, hostname&lt;/P&gt;&lt;P&gt;&amp;nbsp;What is the most elegant approach to searching so that values from our firewall report are returned using the hostname information that was listed in DHCP?&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume I would need to use the rename command to ensure srcip and ip match up, and see a lot of different ways to potentially achieve this and could use some direction on which is the simplest path to take (ie: subsearch?)&lt;/P&gt;&lt;P&gt;Desired End Result:&lt;/P&gt;&lt;P&gt;A report that lists firewall data that includes both IP and Hostname at the time of the log, vs what a DNS lookup would provide, preserving and confirming what IP was assigned to what hostname at the time of the firewall log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 18:41:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/544982#M154329</guid>
      <dc:creator>daryllj</dc:creator>
      <dc:date>2021-03-23T18:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a correlation search between two different indexes (DHCP and Firewall Data)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/544991#M154331</link>
      <description>&lt;P&gt;Look into the join option here. Append and transaction would work, but I think Join would be the best bet. Example below:&lt;BR /&gt;&lt;BR /&gt;-&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchReference/Join" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchReference/Join&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults 
| eval ip = "10.0.0.0" 
| rename ip as src_ip 
| stats count by src_ip 
| eval event="list" 
| join src_ip 
    [| makeresults 
    | eval src_ip = "10.0.0.0", 
        hostname = "desktop",
        event = "append"]&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 23 Mar 2021 19:31:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/544991#M154331</guid>
      <dc:creator>hoaxm3</dc:creator>
      <dc:date>2021-03-23T19:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a correlation search between two different indexes (DHCP and Firewall Data)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/545010#M154335</link>
      <description>&lt;P&gt;Thanks for the guidelines here- I played around with a very basic join command and this resulted in the following:&lt;/P&gt;&lt;P&gt;(index=fortfw) level=warning host="XXXXXXXX" category="Malicious Websites" | rename src as ip | join ip [search index="dhcp"] | stats count by hostname, ip&lt;/P&gt;&lt;P&gt;This seemed to do the trick and I now get my stats that include the hostname.....&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 21:36:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-correlation-search-between-two-different-indexes-DHCP/m-p/545010#M154335</guid>
      <dc:creator>daryllj</dc:creator>
      <dc:date>2021-03-23T21:36:51Z</dc:date>
    </item>
  </channel>
</rss>

