<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk search query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551736#M156572</link>
    <description>&lt;P&gt;Can you share some anonymised raw events from your index so we can see what data you are dealing with?&lt;/P&gt;</description>
    <pubDate>Sun, 16 May 2021 08:06:59 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2021-05-16T08:06:59Z</dc:date>
    <item>
      <title>Splunk search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551730#M156569</link>
      <description>&lt;P&gt;To obtain "list of suspicious IP addresses that attempt to make an unauthorized web connection having&amp;nbsp;a duration of longer than 1 minute" using Splunk search query?&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 05:46:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551730#M156569</guid>
      <dc:creator>Sidmi09</dc:creator>
      <dc:date>2021-05-16T05:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551732#M156570</link>
      <description>&lt;P&gt;What data do you already have ingested and indexed in splunk that might support such a search?&lt;/P&gt;&lt;P&gt;What criteria are you using to determine suspiciousness?&lt;/P&gt;&lt;P&gt;What criteria are you using to determine whether the connection is unauthorised?&lt;/P&gt;&lt;P&gt;Are unauthorised connections of less than a minute to be ignored/unlisted?&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 06:16:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551732#M156570</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-16T06:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551735#M156571</link>
      <description>&lt;P&gt;Using&amp;nbsp;index=botsv2” in all searches. Could you help with completing some questions asked to be completed!!!&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 08:00:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551735#M156571</guid>
      <dc:creator>Sidmi09</dc:creator>
      <dc:date>2021-05-16T08:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551736#M156572</link>
      <description>&lt;P&gt;Can you share some anonymised raw events from your index so we can see what data you are dealing with?&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 08:06:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-query/m-p/551736#M156572</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-16T08:06:59Z</dc:date>
    </item>
  </channel>
</rss>

