<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Compound Search with two sourcetypes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96690#M25009</link>
    <description>&lt;P&gt;Also using the transforms I have in right now the IDS uses "src" for the source IP and the proxy uses "src_ip".&lt;/P&gt;

&lt;P&gt;How would I right the search to convert the IP from one tag to another for the subsearch?&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2013 20:31:12 GMT</pubDate>
    <dc:creator>hartfoml</dc:creator>
    <dc:date>2013-04-16T20:31:12Z</dc:date>
    <item>
      <title>Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96684#M25003</link>
      <description>&lt;P&gt;I want to search for an IDS event like this&lt;/P&gt;

&lt;P&gt;sourcetype=IDS "MALWARE-CNC" &lt;/P&gt;

&lt;P&gt;Then I want to use the src_IP and dst_IP to search the proxy logs to see if the proxy blocked the traffic.  Something Like this I would think&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=IDS "MALWARE-CNC" | fields src_ip dst_ip [ search sourcetype=proxy src_ip dst_ip action!=DENIED]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:44:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96684#M25003</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2020-09-28T13:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96685#M25004</link>
      <description>&lt;P&gt;nearly : )&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=proxy action!=DENIED [ search sourcetype=IDS "MALWARE-CNC" | fields src dst | dedup src dst | rename src as src_ip dst as dst_ip ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Edit&lt;/STRONG&gt; missed out "search" in the sub search&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:05:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96685#M25004</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2013-04-16T20:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96686#M25005</link>
      <description>&lt;P&gt;So why do I put the proxy search first? there are lots of "Not DENIED" logs to look through and I am only looking for one.  Why not find the IP in IDS and pass to the proxy search?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:21:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96686#M25005</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2013-04-16T20:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96687#M25006</link>
      <description>&lt;P&gt;If you are looking for just one, then why use "NOT DENIED"? Instead you can use that same value to search on. Try to create your searches in as positive as possible manner. It will help in performance.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:24:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96687#M25006</guid>
      <dc:creator>theouhuios</dc:creator>
      <dc:date>2013-04-16T20:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96688#M25007</link>
      <description>&lt;P&gt;If I get the IDS alert and it is not denied by the proxy then an exploit is at hand.  If the traffic is denied I can look at it later and don't need the alert right now.&lt;/P&gt;

&lt;P&gt;So the !DENIED will generate an event that I can alert on.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:28:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96688#M25007</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2013-04-16T20:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96689#M25008</link>
      <description>&lt;P&gt;When a subsearch is processed, it's the inner subsearch that is run first,  so in jonuwz's example, the malware-cnc search is processed first,  and it's only the src and dest ip's of the malware search IP's that are then searched for in the proxy data.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:29:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96689#M25008</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2013-04-16T20:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96690#M25009</link>
      <description>&lt;P&gt;Also using the transforms I have in right now the IDS uses "src" for the source IP and the proxy uses "src_ip".&lt;/P&gt;

&lt;P&gt;How would I right the search to convert the IP from one tag to another for the subsearch?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:31:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96690#M25009</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2013-04-16T20:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96691#M25010</link>
      <description>&lt;P&gt;Assuming it's dst and dst_ip on the destination side, it's as follows: &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype=proxy action!=DENIED [ sourcetype=IDS "MALWARE-CNC" | fields src dst | dedup src dst | rename src as src_ip dst as dst_ip ]&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:34:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96691#M25010</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2013-04-16T20:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96692#M25011</link>
      <description>&lt;P&gt;rename should do that.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:35:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96692#M25011</guid>
      <dc:creator>theouhuios</dc:creator>
      <dc:date>2013-04-16T20:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96693#M25012</link>
      <description>&lt;P&gt;Nick thanks for the help.  Here is the search I used&lt;/P&gt;

&lt;P&gt;sourcetype="bcoat_proxysg" action!=TCP_DENIED [ sourcetype=IDS "MALWARE-CNC" | fields src dst | dedup src dst | rename src as src_ip dst as dst_ip ]&lt;/P&gt;

&lt;P&gt;I get this error "Search operation 'sourcetype' is unknown. You might not have permission to run this operation."&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:44:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96693#M25012</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2020-09-28T13:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Compound Search with two sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96694#M25013</link>
      <description>&lt;P&gt;whoops - updated answer ....&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2013 22:15:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Compound-Search-with-two-sourcetypes/m-p/96694#M25013</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2013-04-16T22:15:01Z</dc:date>
    </item>
  </channel>
</rss>

