<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Search based on different requests? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-different-requests/m-p/247636#M189131</link>
    <description>&lt;P&gt;Hello, &lt;/P&gt;

&lt;P&gt;I'm trying to create a search that will allow me to search a subnet for requests made from a single source IP to more than X amount of  destination IPS.&lt;/P&gt;

&lt;P&gt;for example,&lt;/P&gt;

&lt;P&gt;if 10.10.10.10 sends traffic over port 445 to all the devices in the range 10.10.10.11- 10.10.10.50 therefore 40 different Destinations&lt;BR /&gt;
and 10.10.10.20 sent traffic over port 445 to 10.10.10.70 and 10.10.10.66 therefore 2 different destinations.&lt;/P&gt;

&lt;P&gt;I wouldn't want to see the traffic sent from 10.10.10.20 as the total number of destination IPs is too low. &lt;/P&gt;

&lt;P&gt;Is it possible to do something like:&lt;/P&gt;

&lt;P&gt;src_ip=10.10.10.0/24 dest_port=445 dest_ip_count&amp;gt;=10&lt;/P&gt;

&lt;P&gt;src_ip=10.10.10.0/24 -- Range of IPs I want to search for traffic on&lt;BR /&gt;
dest_port=445  --           Port the traffic is being sent on&lt;BR /&gt;
dest_ip_count&amp;gt;=10        Theoretical parameter that filters out source IPs not sending traffic to 10+ different devices&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 09:06:02 GMT</pubDate>
    <dc:creator>karatyman</dc:creator>
    <dc:date>2020-09-29T09:06:02Z</dc:date>
    <item>
      <title>Search based on different requests?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-different-requests/m-p/247636#M189131</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;

&lt;P&gt;I'm trying to create a search that will allow me to search a subnet for requests made from a single source IP to more than X amount of  destination IPS.&lt;/P&gt;

&lt;P&gt;for example,&lt;/P&gt;

&lt;P&gt;if 10.10.10.10 sends traffic over port 445 to all the devices in the range 10.10.10.11- 10.10.10.50 therefore 40 different Destinations&lt;BR /&gt;
and 10.10.10.20 sent traffic over port 445 to 10.10.10.70 and 10.10.10.66 therefore 2 different destinations.&lt;/P&gt;

&lt;P&gt;I wouldn't want to see the traffic sent from 10.10.10.20 as the total number of destination IPs is too low. &lt;/P&gt;

&lt;P&gt;Is it possible to do something like:&lt;/P&gt;

&lt;P&gt;src_ip=10.10.10.0/24 dest_port=445 dest_ip_count&amp;gt;=10&lt;/P&gt;

&lt;P&gt;src_ip=10.10.10.0/24 -- Range of IPs I want to search for traffic on&lt;BR /&gt;
dest_port=445  --           Port the traffic is being sent on&lt;BR /&gt;
dest_ip_count&amp;gt;=10        Theoretical parameter that filters out source IPs not sending traffic to 10+ different devices&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:06:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-based-on-different-requests/m-p/247636#M189131</guid>
      <dc:creator>karatyman</dc:creator>
      <dc:date>2020-09-29T09:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Search based on different requests?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-different-requests/m-p/247637#M189132</link>
      <description>&lt;P&gt;You can do exactly what you asked, and the syntax is not that far from your description!&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=10.10.10.0/24 dest_port=445
| stats dc(dest_ip) as unique_dest_ips by src_ip
| where unique_dest_ips &amp;gt; 10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The &lt;CODE&gt;dc&lt;/CODE&gt; function of the &lt;CODE&gt;stats&lt;/CODE&gt; command counts the number of unique occurrences of a field. In this case, it is counting the number of unique destination ips used by each source ip. Note that Splunk accepts CIDR notation in the search, no problem.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 21:12:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-based-on-different-requests/m-p/247637#M189132</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-03-14T21:12:29Z</dc:date>
    </item>
  </channel>
</rss>

