<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple events from a specific system in a certain time interval in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550120#M156110</link>
    <description>&lt;P&gt;Hi Splunkers,&lt;/P&gt;&lt;P&gt;I need your help on the following data set.&lt;/P&gt;&lt;P&gt;Index=auditbeat&lt;BR /&gt;host --&amp;gt; log source&lt;BR /&gt;command --&amp;gt; command run by host&lt;BR /&gt;_time --&amp;gt; _time&lt;/P&gt;&lt;P&gt;host1:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host1 in time interval above (15 min) : ls, tar, sudo, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;host2:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host2 in time interval above (15 min) : ls, rm, history, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;host3:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host3 in time interval above (15 min) : ls, chown, chroot, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;I need to write a search which will look at each 15 min time interval, within&amp;nbsp; EACH15 min time interval if any machine (host) run all these command 'whoami','chroot' and 'history', search will list the result as following&lt;/P&gt;&lt;P&gt;time interval -- host -- commands&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
    <pubDate>Sat, 01 May 2021 18:53:24 GMT</pubDate>
    <dc:creator>splunkerer</dc:creator>
    <dc:date>2021-05-01T18:53:24Z</dc:date>
    <item>
      <title>Multiple events from a specific system in a certain time interval</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550120#M156110</link>
      <description>&lt;P&gt;Hi Splunkers,&lt;/P&gt;&lt;P&gt;I need your help on the following data set.&lt;/P&gt;&lt;P&gt;Index=auditbeat&lt;BR /&gt;host --&amp;gt; log source&lt;BR /&gt;command --&amp;gt; command run by host&lt;BR /&gt;_time --&amp;gt; _time&lt;/P&gt;&lt;P&gt;host1:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host1 in time interval above (15 min) : ls, tar, sudo, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;host2:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host2 in time interval above (15 min) : ls, rm, history, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;host3:&lt;BR /&gt;_time : 00.00:00 - 00.15:00 --&amp;gt; 15 min interval&lt;BR /&gt;commands run by host3 in time interval above (15 min) : ls, chown, chroot, whoami, cd, mkdir&lt;/P&gt;&lt;P&gt;I need to write a search which will look at each 15 min time interval, within&amp;nbsp; EACH15 min time interval if any machine (host) run all these command 'whoami','chroot' and 'history', search will list the result as following&lt;/P&gt;&lt;P&gt;time interval -- host -- commands&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 18:53:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550120#M156110</guid>
      <dc:creator>splunkerer</dc:creator>
      <dc:date>2021-05-01T18:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple events from a specific system in a certain time interval</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550123#M156112</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234050"&gt;@splunkerer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;history&lt;/EM&gt; is typically a built-in shell command, but assuming your log configuration captures all commands, including shell built-ins, you can use e.g.:&lt;/P&gt;&lt;P&gt;index=auditbeat&lt;BR /&gt;| bin _time span=15m&lt;BR /&gt;| stats values(&lt;SPAN&gt;command&lt;/SPAN&gt;) as &lt;SPAN&gt;command&amp;nbsp;&lt;/SPAN&gt;by _time host&lt;BR /&gt;| search &lt;SPAN&gt;command&lt;/SPAN&gt;=whoami &lt;SPAN&gt;command&lt;/SPAN&gt;=chroot &lt;SPAN&gt;command&lt;/SPAN&gt;=history&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 21:37:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550123#M156112</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-05-01T21:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple events from a specific system in a certain time interval</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550127#M156114</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/49493"&gt;@tscroggins&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"| search&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=whoami&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=chroot&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=history" this line is looking all these commands are available in a time span( in our example 15 min) rigth?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 23:03:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550127#M156114</guid>
      <dc:creator>splunkerer</dc:creator>
      <dc:date>2021-05-01T23:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple events from a specific system in a certain time interval</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550128#M156115</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234050"&gt;@splunkerer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Effectively, yes.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;| bin _time span=15m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The bin command converts every time value to the prior 15 minute boundary. E.g. 00:01:01 =&amp;gt; 00:00:00, 00:17:30 =&amp;gt; 00:15:00, 00:32:00 =&amp;gt; 00:30:00, and 00:59:35 =&amp;gt; 00:45:00.&lt;/P&gt;&lt;P&gt;Note that binning _time in this way does not produce a&amp;nbsp;&lt;EM&gt;rolling&lt;/EM&gt; 15 minute window. For example, if chroot is executed at 00:59:59.999999 and whoami is executed at 01:00:00.000000, the commands will be binned into &lt;EM&gt;separate&lt;/EM&gt; 15 minute intervals.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;| stats values(&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;) as&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;by _time host&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The stats command uses the values function to aggregate all distinct&amp;nbsp;&lt;EM&gt;command&lt;/EM&gt; values by _time (now binned into 15 minute buckets) and host. The resulting&amp;nbsp;&lt;EM&gt;command&lt;/EM&gt; field will be&amp;nbsp;&lt;EM&gt;multi-valued&lt;/EM&gt;, i.e. it will have one or more simultaneous values.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;| search&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=whoami&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=chroot&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;command&lt;/SPAN&gt;&lt;SPAN&gt;=history&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The search command looks for all events with&amp;nbsp;&lt;EM&gt;command&amp;nbsp;&lt;/EM&gt;values of &lt;EM&gt;whoami&lt;/EM&gt;, &lt;EM&gt;chroot&lt;/EM&gt;, and &lt;EM&gt;history&lt;/EM&gt;. Since&amp;nbsp;&lt;EM&gt;command&lt;/EM&gt; is now multi-valued, it can (and must) contain all of these values at the same time.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 23:56:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multiple-events-from-a-specific-system-in-a-certain-time/m-p/550128#M156115</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-05-01T23:56:50Z</dc:date>
    </item>
  </channel>
</rss>

