<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add priority to systems and setup alerts for critical systems in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131184#M184544</link>
    <description>&lt;P&gt;Thanks it works with a slight modification:&lt;/P&gt;

&lt;P&gt;yoursearchhere&lt;BR /&gt;
| lookup assetLookup assetId as src_ip OUTPUT priority&lt;BR /&gt;
| stats count by priority&lt;/P&gt;

&lt;P&gt;yoursearchhere&lt;BR /&gt;
| lookup assetLookup assetId as host OUTPUT priority&lt;BR /&gt;
| where priority="High" OR priority="Critical"&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2013 18:48:25 GMT</pubDate>
    <dc:creator>spj2</dc:creator>
    <dc:date>2013-11-07T18:48:25Z</dc:date>
    <item>
      <title>Add priority to systems and setup alerts for critical systems</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131182#M184542</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying to find automatic way of adding asset priority (Critical, High etc.) based on IP address and/or hostname in the Splunk Enterprise app so that I can setup alerts and prioritize investigations on these. I know that Splunk PCI Compliance app does that but we don't have it. I have searched the forum too, but haven't found anything.&lt;/P&gt;

&lt;P&gt;Does anyone know of a way to achieve this?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;

&lt;P&gt;SPJ&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2013 17:59:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131182#M184542</guid>
      <dc:creator>spj2</dc:creator>
      <dc:date>2013-11-06T17:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: Add priority to systems and setup alerts for critical systems</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131183#M184543</link>
      <description>&lt;P&gt;I suggest using a lookup table. Your CSV file might look like this&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;AssetList.csv&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;assetId,priority
192.168.15.22,Medium
fileserver01,Low
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is the Splunk tutorial &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0/SearchTutorial/Usefieldlookups"&gt;Use field lookups&lt;/A&gt; In my examples below, I assume that you have uploaded the AssetList.csv file and created a lookup called &lt;CODE&gt;assetLookup&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Ultimately, you should be able to do something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;yoursearchhere
| lookup assetLookup src_ip as assetId OUTPUT priority
| stats count by priority

yoursearchhere
| lookup assetLookup host as assetId OUTPUT priority
| where priority="High" OR priority="Critical"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 06 Nov 2013 19:06:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131183#M184543</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2013-11-06T19:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: Add priority to systems and setup alerts for critical systems</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131184#M184544</link>
      <description>&lt;P&gt;Thanks it works with a slight modification:&lt;/P&gt;

&lt;P&gt;yoursearchhere&lt;BR /&gt;
| lookup assetLookup assetId as src_ip OUTPUT priority&lt;BR /&gt;
| stats count by priority&lt;/P&gt;

&lt;P&gt;yoursearchhere&lt;BR /&gt;
| lookup assetLookup assetId as host OUTPUT priority&lt;BR /&gt;
| where priority="High" OR priority="Critical"&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2013 18:48:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-priority-to-systems-and-setup-alerts-for-critical-systems/m-p/131184#M184544</guid>
      <dc:creator>spj2</dc:creator>
      <dc:date>2013-11-07T18:48:25Z</dc:date>
    </item>
  </channel>
</rss>

