<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you compare multiple events to filter out the same host with different field values? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440663#M191177</link>
    <description>&lt;P&gt;Here is an example looking at the result of the current search we use.  We would want to be able to filter it out to only the ones that are just open:&lt;/P&gt;

&lt;P&gt;(first host, we would want to filter down to see events like this)&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.14                      Severity: Medium &lt;BR /&gt;
Message: FIREEYE NX ALERT [SmartVision-Event]      Malware: user enumeration attempt&lt;BR /&gt;&lt;BR /&gt;
Owner:                                   Status: Open                Time: 8/8/2019 11:37&lt;BR /&gt;&lt;BR /&gt;
count: 1&lt;/P&gt;

&lt;P&gt;(second and third host, would want to filter out all of these due to the Owner field being full in at least one of the events, and one of the Status fields being set to Closed) &lt;/P&gt;

&lt;P&gt;Source: 10.0.0.11                    Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]     Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;      Status: Closed               Time: 8/8/2019 10:07&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;      Status: Open            Time: 8/8/2019 10:27 &lt;BR /&gt;
count: 2&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.10                    Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Closed                Time: 8/8/2019 10:27&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Open             Time: 8/8/2019 11:12 &lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]     Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner:                                Status:                            Time: 8/8/2019 11:27&lt;BR /&gt;
count: 3&lt;/P&gt;</description>
    <pubDate>Thu, 08 Aug 2019 18:21:12 GMT</pubDate>
    <dc:creator>RyanDonnelly22</dc:creator>
    <dc:date>2019-08-08T18:21:12Z</dc:date>
    <item>
      <title>How do you compare multiple events to filter out the same host with different field values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440661#M191175</link>
      <description>&lt;P&gt;I have alert logs coming in from an AV tool and when a tech is working on an alert assigned it to themselves, it generates a new log file, same when it is closed.&lt;/P&gt;

&lt;P&gt;This is the basic search I have for all the events:&lt;/P&gt;

&lt;P&gt;index="AV"&lt;BR /&gt;&lt;BR /&gt;
|rename assignedTo.username as Owner&lt;BR /&gt;&lt;BR /&gt;
| rename alertTypeDetails.detail.agenthostname as agenthostname&lt;BR /&gt;
|rename alertTypeDetails.source as source &lt;BR /&gt;
| eval "Source"=coalesce(source,agenthostnamee," N/A ") &lt;BR /&gt;
| rename alertTypeDetails.detail.virus as virus &lt;BR /&gt;
| rename alertTypeDetails.detail.category as category &lt;BR /&gt;
| eval "Malware"=coalesce(iocnames, virus, category, " N/A ") &lt;BR /&gt;
| eval Owner=if(isnull(Owner)," ",Owner)&lt;BR /&gt;&lt;BR /&gt;
| eval Time=strftime(_time, " %m/%d/%Y %H:%M:%S") &lt;BR /&gt;
| stats  values(risk) as Severity values(message) as Message values(Malware) as Malware  values(Owner) as Owner  values(state) as Status values(customer_id) as Helix values(Time) as Time count by Source&lt;BR /&gt;&lt;BR /&gt;
| sort    -Status&lt;/P&gt;

&lt;P&gt;I want to exclude the hosts that have additional events where the values of Owner is not " " and the Status is not Open, so I can just see the new events that haven't been assigned or closed yet.  &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:41:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440661#M191175</guid>
      <dc:creator>RyanDonnelly22</dc:creator>
      <dc:date>2020-09-30T01:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: How do you compare multiple events to filter out the same host with different field values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440662#M191176</link>
      <description>&lt;P&gt;Hi @RyanDonnelly22 , a few sample events would help correlate with the query posted.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 16:48:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440662#M191176</guid>
      <dc:creator>vik_splunk</dc:creator>
      <dc:date>2019-08-08T16:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do you compare multiple events to filter out the same host with different field values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440663#M191177</link>
      <description>&lt;P&gt;Here is an example looking at the result of the current search we use.  We would want to be able to filter it out to only the ones that are just open:&lt;/P&gt;

&lt;P&gt;(first host, we would want to filter down to see events like this)&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.14                      Severity: Medium &lt;BR /&gt;
Message: FIREEYE NX ALERT [SmartVision-Event]      Malware: user enumeration attempt&lt;BR /&gt;&lt;BR /&gt;
Owner:                                   Status: Open                Time: 8/8/2019 11:37&lt;BR /&gt;&lt;BR /&gt;
count: 1&lt;/P&gt;

&lt;P&gt;(second and third host, would want to filter out all of these due to the Owner field being full in at least one of the events, and one of the Status fields being set to Closed) &lt;/P&gt;

&lt;P&gt;Source: 10.0.0.11                    Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]     Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;      Status: Closed               Time: 8/8/2019 10:07&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;      Status: Open            Time: 8/8/2019 10:27 &lt;BR /&gt;
count: 2&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.10                    Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Closed                Time: 8/8/2019 10:27&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]      Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Open             Time: 8/8/2019 11:12 &lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]     Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner:                                Status:                            Time: 8/8/2019 11:27&lt;BR /&gt;
count: 3&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 18:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440663#M191177</guid>
      <dc:creator>RyanDonnelly22</dc:creator>
      <dc:date>2019-08-08T18:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do you compare multiple events to filter out the same host with different field values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440664#M191178</link>
      <description>&lt;P&gt;Here is an example of the results we see:&lt;/P&gt;

&lt;P&gt;(first host, we would want to filter down to just see hosts like this)&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.14          Severity: Medium &lt;BR /&gt;
Message: FIREEYE NX ALERT [SmartVision-Event]   Malware: user enumeration attempt&lt;BR /&gt;&lt;BR /&gt;
Owner:                    Status: Open          Time: 8/8/2019 11:37&lt;BR /&gt;&lt;BR /&gt;
count: 1&lt;/P&gt;

&lt;P&gt;(second and third host, would want to filter out all of these due to one of their Owner fields being full and one of the Status fields being set to Closed) &lt;/P&gt;

&lt;P&gt;Source: 10.0.0.11          Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]   Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;     Status: Closed        Time: 8/8/2019 10:07&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]   Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user2@corp.com"&gt;user2@corp.com&lt;/A&gt;     Status: Open          Time: 8/8/2019 10:27&lt;BR /&gt;&lt;BR /&gt;
count: 2&lt;/P&gt;

&lt;P&gt;Source: 10.0.0.10          Severity: Low&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]   Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Closed        Time: 8/8/2019 10:27&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]   Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status: Open          Time: 8/8/2019 11:12&lt;BR /&gt;&lt;BR /&gt;
Message: FIREEYE NX ALERT [Riskware-Callback]   Malware: adware.downware&lt;BR /&gt;&lt;BR /&gt;
Owner: &lt;A href="mailto:user1@corp.com"&gt;user1@corp.com&lt;/A&gt;     Status:               Time: 8/8/2019 11:27&lt;BR /&gt;
count: 3 &lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 18:27:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440664#M191178</guid>
      <dc:creator>RyanDonnelly22</dc:creator>
      <dc:date>2019-08-08T18:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: How do you compare multiple events to filter out the same host with different field values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440665#M191179</link>
      <description>&lt;P&gt;I was able to find an answer.  &lt;/P&gt;

&lt;P&gt;I need to use the 'where' command at the end of my search&lt;/P&gt;

&lt;P&gt;| stats values(risk) as Severity values(message) as Message values(Malware) as Malware values(Owner) as Owner values(state) as Status values(customer_id) as Helix values(Time) as Time count by Source &lt;BR /&gt;
&lt;STRONG&gt;| where Status !="Closed" and Owner="  "&lt;/STRONG&gt;&lt;BR /&gt;
| sort -Status&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2019 18:03:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-you-compare-multiple-events-to-filter-out-the-same-host/m-p/440665#M191179</guid>
      <dc:creator>RyanDonnelly22</dc:creator>
      <dc:date>2019-08-09T18:03:04Z</dc:date>
    </item>
  </channel>
</rss>

