<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a search query in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573524#M199856</link>
    <description>&lt;P&gt;I am trying to create a query that can provide an output of a Security Center scan.&amp;nbsp; &amp;nbsp;The output should be able to provide the following in the same order:&lt;/P&gt;&lt;P&gt;1.) IP Address&lt;/P&gt;&lt;P&gt;2.) DNS Name&lt;/P&gt;&lt;P&gt;3.) System Name&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.) MAC address&lt;/P&gt;&lt;P&gt;5.) OS Type&lt;/P&gt;&lt;P&gt;6.) OS Version&lt;/P&gt;&lt;P&gt;7.) OS Build&lt;/P&gt;&lt;P&gt;8.) System Manufacture&amp;nbsp;&lt;/P&gt;&lt;P&gt;9.) System Serial Number&lt;/P&gt;&lt;P&gt;10.) System Model&lt;/P&gt;&lt;P&gt;11.) AWS Account Number&lt;/P&gt;&lt;P&gt;12.) AWS Instance ID number&lt;/P&gt;&lt;P&gt;To answer your question there should be values for each category but if there is none then that is ok as well.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Nov 2021 19:34:55 GMT</pubDate>
    <dc:creator>Omarop</dc:creator>
    <dc:date>2021-11-03T19:34:55Z</dc:date>
    <item>
      <title>Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573350#M199811</link>
      <description>&lt;P&gt;I am trying to create a search query that pulls tenable (critical, and high) scan results that provides an output of the Tenable (ACAS) critical and high scan results with the following information:&lt;/P&gt;&lt;P&gt;1.) IP Address (unique identifier for ACAS mapping to Xacta)&lt;/P&gt;&lt;P&gt;2.) DNS Name&lt;/P&gt;&lt;P&gt;3.) System Name&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.) MAC address&amp;nbsp;&lt;/P&gt;&lt;P&gt;5.) OS Type&lt;/P&gt;&lt;P&gt;6.) OS Version&lt;/P&gt;&lt;P&gt;7.) OS Build&lt;/P&gt;&lt;P&gt;8.) System Manufacture&lt;/P&gt;&lt;P&gt;9.) System Serial Number&lt;/P&gt;&lt;P&gt;10.) System Model&lt;/P&gt;&lt;P&gt;11.) AWS Account Number (new field to capture in the standard)&lt;/P&gt;&lt;P&gt;12.) AWS Instance ID #&lt;/P&gt;&lt;P&gt;13.) AWS ENI&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 17:57:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573350#M199811</guid>
      <dc:creator>Omarop</dc:creator>
      <dc:date>2021-11-02T17:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573353#M199812</link>
      <description>&lt;P&gt;for example: I am running the following query and I get some of the information but I don't get the rest.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Query&lt;/P&gt;&lt;P&gt;index=acas sourcetype="tenable:sc:vuln"&amp;nbsp; (severity=crtical or severity=high) | eval lastSeen=strftime(lastSeen,"%m-%d-%Y") | stats max(lastSeen) AS Last_Seen by severity,&amp;nbsp; IP address, DNS name, system name, MAC address, OS Type, OS version, OS build, system manufacture, system serial number, system model, AWS account number, AWS instance ID number, AWS ENI&lt;/P&gt;&lt;P&gt;When I run the query I don't get all of the information&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 18:46:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573353#M199812</guid>
      <dc:creator>Omarop</dc:creator>
      <dc:date>2021-11-02T18:46:13Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573365#M199814</link>
      <description>&lt;P&gt;Do all the fields have values in all the events or are you only getting stats for events where none of these fields are empty?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 19:30:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573365#M199814</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-11-02T19:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573524#M199856</link>
      <description>&lt;P&gt;I am trying to create a query that can provide an output of a Security Center scan.&amp;nbsp; &amp;nbsp;The output should be able to provide the following in the same order:&lt;/P&gt;&lt;P&gt;1.) IP Address&lt;/P&gt;&lt;P&gt;2.) DNS Name&lt;/P&gt;&lt;P&gt;3.) System Name&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.) MAC address&lt;/P&gt;&lt;P&gt;5.) OS Type&lt;/P&gt;&lt;P&gt;6.) OS Version&lt;/P&gt;&lt;P&gt;7.) OS Build&lt;/P&gt;&lt;P&gt;8.) System Manufacture&amp;nbsp;&lt;/P&gt;&lt;P&gt;9.) System Serial Number&lt;/P&gt;&lt;P&gt;10.) System Model&lt;/P&gt;&lt;P&gt;11.) AWS Account Number&lt;/P&gt;&lt;P&gt;12.) AWS Instance ID number&lt;/P&gt;&lt;P&gt;To answer your question there should be values for each category but if there is none then that is ok as well.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 19:34:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573524#M199856</guid>
      <dc:creator>Omarop</dc:creator>
      <dc:date>2021-11-03T19:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573526#M199858</link>
      <description>&lt;P&gt;To add to your question, it all depends on the Security Center scan data once ingested into Splunk.&amp;nbsp; &amp;nbsp;The fields don't&amp;nbsp;necessarily have to have value (it all depends on the scan results.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 19:38:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573526#M199858</guid>
      <dc:creator>Omarop</dc:creator>
      <dc:date>2021-11-03T19:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573541#M199865</link>
      <description>&lt;P&gt;For your stats command, &lt;U&gt;all&lt;/U&gt; the fields mentioned in the by clause need to have values in &lt;U&gt;all&lt;/U&gt; the events you want to include in the stats. Since you have some events without values for some of the fields, this will be why the numbers are not coming out as you expected.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 21:45:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573541#M199865</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-11-03T21:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573633#M199905</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;So I attempted the following and I am able to get some of the information.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;index=acas sourcetype="tenable:sc:vuln" ( severity=crtiical OR severity=high ) eval lastSeen=strftime(lastSeen, "%m-%d-%Y") | stats count by ip, repository.dataFormat, netbiosName, dnsName, host, macAddress, operationSystem, family.name, version&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to get the rest of the information but I think it is related to the naming convention.&amp;nbsp; &amp;nbsp;Not exactly sure how to get the other fields (System Manufacture, System Serial Number, System Model, AWS Account Number, AWS Instance ID #, AWS ENI, System location, and System Purpose)&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 15:08:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573633#M199905</guid>
      <dc:creator>Omarop</dc:creator>
      <dc:date>2021-11-04T15:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a search query in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573634#M199906</link>
      <description>&lt;P&gt;If the field names have embedded spaces or other special characters, they should be in single quotes.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 15:11:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-search-query-in-Splunk/m-p/573634#M199906</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-11-04T15:11:54Z</dc:date>
    </item>
  </channel>
</rss>

