<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: To analyse the traffic of specific ip address , dest  with port in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657539#M227121</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;yes I have some index and sourcetypes&lt;BR /&gt;but I don't know how to choose the index and sourcetypes for this ip address&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Can you confirm this: So you want to know which index/indices, and which sourcetype(s) contain records of interest. &amp;nbsp;Is this correct?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* src=**.**.***.** OR **.**.***.** dest_ip=**.***.***.*** dest_port=443
| stats count by index sourcetype&lt;/LI-CODE&gt;&lt;P&gt;This should give you &amp;nbsp;a list of index-sourcetype combinations that contain the specific IP and port. (Also, if you can use search command immediately following a search command, the two search commands should be combined into one. (The first command is an implied "search".)&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2023 06:56:27 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2023-09-14T06:56:27Z</dc:date>
    <item>
      <title>How to analyse the traffic of specific ip address , dest  with port?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657436#M227081</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;i didn't get the result by using this below&amp;nbsp; query search.&amp;nbsp;&lt;BR /&gt;how to check and confirm the index and source type specifically to precise the query&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;index=*| search src=**.**.***.** OR **.**.***.** dest_ip=**.***.***.*** dest_port=443&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;How to confirm the source type and index&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 16:59:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657436#M227081</guid>
      <dc:creator>Jana42855</dc:creator>
      <dc:date>2023-09-14T16:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: To analyse the traffic of specific ip address , dest  with port</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657447#M227086</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/260542"&gt;@Jana42855&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I suppose that you already have the log indexed and stored in an index with one sourcetype.&lt;/P&gt;&lt;P&gt;At first you should define the index where the logs are stored and the sourcetype to use.&lt;/P&gt;&lt;P&gt;Then, using this index and this sourcetype, you should check &lt;SPAN&gt;if the field names are correct (field names are case sensitive) and&amp;nbsp;&lt;/SPAN&gt;if the fields to use in the search (&lt;SPAN&gt;&amp;nbsp;src, dest_ip, dest_port) are present in all events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then you don't need to use the search command, put all the parameters in the main search, you'll have a more performant search, then don't use index=*, because is slower than index=your_index.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your_index&amp;gt; src=**.**.***.** OR **.**.***.** dest_ip=**.***.***.*** dest_port=443&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 15:52:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657447#M227086</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-13T15:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: To analyse the traffic of specific ip address , dest  with port</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657452#M227088</link>
      <description>&lt;P&gt;Hi Thanks for the reply..&lt;BR /&gt;&lt;BR /&gt;yes I have some index and sourcetypes&lt;BR /&gt;but I don't know how to choose the index and sourcetypes for this ip address&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 16:05:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657452#M227088</guid>
      <dc:creator>Jana42855</dc:creator>
      <dc:date>2023-09-13T16:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: To analyse the traffic of specific ip address , dest  with port</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657539#M227121</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;yes I have some index and sourcetypes&lt;BR /&gt;but I don't know how to choose the index and sourcetypes for this ip address&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Can you confirm this: So you want to know which index/indices, and which sourcetype(s) contain records of interest. &amp;nbsp;Is this correct?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* src=**.**.***.** OR **.**.***.** dest_ip=**.***.***.*** dest_port=443
| stats count by index sourcetype&lt;/LI-CODE&gt;&lt;P&gt;This should give you &amp;nbsp;a list of index-sourcetype combinations that contain the specific IP and port. (Also, if you can use search command immediately following a search command, the two search commands should be combined into one. (The first command is an implied "search".)&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 06:56:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657539#M227121</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-14T06:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: To analyse the traffic of specific ip address , dest  with port</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657554#M227123</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/260542"&gt;@Jana42855&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;the first step is to know the data to search, otherwise it's very difficoult!&lt;/P&gt;&lt;P&gt;Anyway, you could start to run a search like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your_index&amp;gt; (src=* OR dest_ip=* OR dest_port=*)&lt;/LI-CODE&gt;&lt;P&gt;in this way you have all the events containing these fields.&lt;/P&gt;&lt;P&gt;then you can analyze them&amp;nbsp; and identify index and sourcetype to use.&lt;/P&gt;&lt;P&gt;Remember that you can see only the indexes where you were enabled, in other words, if you don't have grants to access an index you don't see it.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 07:59:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-analyse-the-traffic-of-specific-ip-address-dest-with-port/m-p/657554#M227123</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-14T07:59:19Z</dc:date>
    </item>
  </channel>
</rss>

