<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218032#M188017</link>
    <description>&lt;P&gt;With a bit of work, you could get all of this to run in a single search but this is more clear and obvious.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jun 2016 18:09:35 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2016-06-27T18:09:35Z</dc:date>
    <item>
      <title>How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218026#M188011</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;

&lt;P&gt;First time poster here.  Our organization manages Splunk and allows other people access to Search.  However, they have an index for just OS logs so Windows and Linux are mixed in with each other.  I'm also trying to find out when the last time a "WinEventLog" source talked to Splunk so I can query machines that are not communicating.&lt;/P&gt;

&lt;P&gt;So, can someone tell me how I can search for a Windows host that hasn't forwarded a "WinEventLog" in "X" minutes?  I can do the search for the latter part.  However, since Linux hosts will never forward a "WinEventLog", I would get the list of Linux hosts within the result.  I would really appreciate any help you can give me.  Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 14:02:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218026#M188011</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-06-23T14:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218027#M188012</link>
      <description>&lt;P&gt;Just setup a Distributed Management Console (DMC).  It is easy and you will have to do it sooner or later and it does all that you need now and WAAAAAAY more, most of which you will (know that you) need soon enough:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.1/DMC/DMCoverview"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.1/DMC/DMCoverview&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 23:59:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218027#M188012</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-23T23:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218028#M188013</link>
      <description>&lt;P&gt;Exactly as woodcock said - The DMC has a section for the forwarders and you can produce a report of the "missing" ones.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1487i8FBEBD2443F5CABB/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2016 00:19:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218028#M188013</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2016-06-24T00:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218029#M188014</link>
      <description>&lt;P&gt;Thanks.  But that's not an option for me since I don't administer the console.  I could make that request but right now the only tool I have available to me is search.  So although the DMC would be the easy way, I need a way to do the equivalent (or similar) via search.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2016 12:17:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218029#M188014</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-06-24T12:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218030#M188015</link>
      <description>&lt;P&gt;You will need 2 searches&lt;/P&gt;

&lt;P&gt;The first search maintains a list of hosts that have ever been seen (so you can tell when they disappear).  Schedule this search to run every hour for the last hour:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats values(host) AS host WHERE index=&amp;lt;YourIndexHere&amp;gt; sourcetype=WinEventLog | mvexpand host
| appendpipe [|inputcsv WinEventLogHosts.csv ]
| dedup host
| outputcsv WinEventLogHosts.csv
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Next schedule this alert to run every minute for the last 5 minutes:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats values(host) AS host WHERE index=&amp;lt;YourIndexHere&amp;gt; sourcetype=WinEventLog | eval type="NEW" | mvexpand host
| appendpipe [|inputcsv WinEventLogHosts.csv | eval type="OLD"]
| stats dc(type) as numTypes values(*) AS * by host
| search numTypes=1 AND type="OLD"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 25 Jun 2016 02:56:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218030#M188015</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-25T02:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218031#M188016</link>
      <description>&lt;P&gt;Thanks.  I will give this a try and see if it will work for me.  I'll report back in the next day or so.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 13:10:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218031#M188016</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-06-27T13:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218032#M188017</link>
      <description>&lt;P&gt;With a bit of work, you could get all of this to run in a single search but this is more clear and obvious.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 18:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218032#M188017</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-06-27T18:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218033#M188018</link>
      <description>&lt;P&gt;woodcock, I know this has been a while but I didn't notice until our admins gave me access to another domain last week.  The first search above works, but it pulls a list from all the domains I have access to.  Not just the one defined in the WHERE index= [my index] clause.  Any idea why that happens?  I explicity state the index and it shows me a combined list from six indexes I have access to.  Yet, if I take out the WHERE clause the search doesn't work.  So the clause is required but it acts like it's being ignored.  Any idea why that would be?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 18:13:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218033#M188018</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-07-25T18:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218034#M188019</link>
      <description>&lt;P&gt;Disregard.  Figured it out&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 18:25:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218034#M188019</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-07-25T18:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218035#M188020</link>
      <description>&lt;P&gt;woodcock,&lt;/P&gt;

&lt;P&gt;So I'm assuming I would schedule the cron job to run -5m (earliest) to now (latest) and the cron expression would be &lt;EM&gt;/1&lt;/EM&gt;***?  Also, what would the trigger be?  I'm assuming I'd want to report on anything that shows up as "NEW".  Would that be a custom trigger?  Sorry to be a pest.    &lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 19:47:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218035#M188020</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-07-25T19:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to Get a List of Windows Hosts When Indexed With Other OS and Specific Source Type</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218036#M188021</link>
      <description>&lt;P&gt;It is whatever your &lt;CODE&gt;X&lt;/CODE&gt; is.  Let's say your reporting threshold is 5 minutes (if a server doesn't log for 5 minutes then it is down).  The decide how soon you need to be notified with a number equal-to or less than 5, for example, within 1 minute, then the period will be &lt;CODE&gt;Every minute&lt;/CODE&gt; or &lt;CODE&gt;*/1 * * * *&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 20:58:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Get-a-List-of-Windows-Hosts-When-Indexed-With-Other-OS/m-p/218036#M188021</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-25T20:58:10Z</dc:date>
    </item>
  </channel>
</rss>

