<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple source and Destination lookup in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686793#M234233</link>
    <description>&lt;P&gt;This could be a number of things as to why your not getting any results.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;With Splunk you should be able to see the fields in the fields side bar provided you have access to the index (permissions) and the data has been onboarded correctly and fields are extracted.&lt;BR /&gt;&lt;BR /&gt;Run&amp;nbsp;&lt;SPAN&gt;index="firewall" and see of you get data and then you should find the sourcetype associated with the data you want to search.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Example&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index="firewall" sourcetype=&amp;lt;Add your sourcetype here&amp;gt;
| table host, src_addr, dest_addr 
&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;Note: The fields your interested based on your data may be different - so look at the left fields side bar.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you&amp;nbsp; cant get anything, it may be that you don't have permissions to see that firewall index/data or the data has not been onboarded correctly&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 May 2024 19:35:32 GMT</pubDate>
    <dc:creator>deepakc</dc:creator>
    <dc:date>2024-05-07T19:35:32Z</dc:date>
    <item>
      <title>Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686790#M234231</link>
      <description>&lt;P&gt;I am looking to write a simple search that tells me if a host or hosts are reaching out to a specific IP address.&amp;nbsp; So far I have&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index="firewall" host=hostname src_addr=x.x.x.x dest_addr=x.x.x.x&lt;/LI-CODE&gt;
&lt;P&gt;When I run this it doesn't come back with anything.&amp;nbsp; Should I be searching under my domain instead?&amp;nbsp; I would like for it to be lined up like below,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hostname | source IP | destination IP&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 19:43:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686790#M234231</guid>
      <dc:creator>Sotu</dc:creator>
      <dc:date>2024-05-07T19:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686793#M234233</link>
      <description>&lt;P&gt;This could be a number of things as to why your not getting any results.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;With Splunk you should be able to see the fields in the fields side bar provided you have access to the index (permissions) and the data has been onboarded correctly and fields are extracted.&lt;BR /&gt;&lt;BR /&gt;Run&amp;nbsp;&lt;SPAN&gt;index="firewall" and see of you get data and then you should find the sourcetype associated with the data you want to search.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Example&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index="firewall" sourcetype=&amp;lt;Add your sourcetype here&amp;gt;
| table host, src_addr, dest_addr 
&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;Note: The fields your interested based on your data may be different - so look at the left fields side bar.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you&amp;nbsp; cant get anything, it may be that you don't have permissions to see that firewall index/data or the data has not been onboarded correctly&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 19:35:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686793#M234233</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-05-07T19:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686797#M234234</link>
      <description>&lt;P&gt;Thanks!&amp;nbsp; I will give this a shot and see if it works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 19:40:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686797#M234234</guid>
      <dc:creator>Sotu</dc:creator>
      <dc:date>2024-05-07T19:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686801#M234236</link>
      <description>&lt;P&gt;Running the index="firewall" works successfully and adding the sourcetype="firewall" lets me search through the logs successfully but it will only let me filter and look for the fields below for some reason.&amp;nbsp; I can't look for destination IP addresses?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sotu_0-1715111320780.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30729iF2EB543BFCED57AC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sotu_0-1715111320780.png" alt="Sotu_0-1715111320780.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 19:49:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686801#M234236</guid>
      <dc:creator>Sotu</dc:creator>
      <dc:date>2024-05-07T19:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686845#M234254</link>
      <description>&lt;P&gt;Sourcetype&amp;nbsp; is important because it categorises the raw data and should extract / parse the data into fields.&amp;nbsp; From the screen shot it looks like your data is not being parsed/extracted on the SH.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;1. You most likely do not have the correct sourcetype or TA installed for you TA.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;2. Obviously this is firewall data (I have never heard of a sourcetype firewall, but it could be a custom name, normally its called or set with a meaningful name like cisco:asa&amp;nbsp; &amp;nbsp;etc.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Run this command and see if it returns any sourcetypes, if it still &lt;STRONG&gt;doesn't&lt;/STRONG&gt;, identify the &lt;STRONG&gt;vendor&lt;/STRONG&gt; of the firewall logs, find the TA in Splunk base, look at how you are ingesting this data, inputs and check and note the metadata settings, use the sourcetype from there. If not you will have to develop a custom one for this data source.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index=firewall BY sourcetype, index
| stats values(sourcetype) BY index&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 07:00:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686845#M234254</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-05-08T07:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Simple source and Destination lookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686850#M234256</link>
      <description>&lt;P&gt;What you can search for depends on your data. If you have properly onboarded data, you should have your events ingested with a well-defined sourcetype and have your fields extracted. Otherwise Splunk might simply not know what you mean by "src_addr" or "dest_addr".&lt;/P&gt;&lt;P&gt;Even better if you have your data CIM-compliant - then you can search from datamodel using just standardized fields regardless of the actual fields contained within the original raw event. But that's a bit more advanced topic. The first thing would be to verify what fields you actually have available.&lt;/P&gt;&lt;P&gt;Try running&lt;/P&gt;&lt;PRE&gt;index=firewall host=your_firewall | head 10&lt;/PRE&gt;&lt;P&gt;in verbose mode and expand a single event to see what fields are extracted.&lt;/P&gt;&lt;P&gt;If your fields are called - for example - src_ip and dest_ip, searching for src_addr and dest_addr will yield no results because Splunk doesn't know those fields.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 07:40:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Simple-source-and-Destination-lookup/m-p/686850#M234256</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-05-08T07:40:29Z</dc:date>
    </item>
  </channel>
</rss>

