<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286568#M86782</link>
    <description>&lt;P&gt;Try this to list all dest_ip visited by all three src_ip in the past 2 days&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333 type=TRAFFIC earliest=-2d@d | stats dc(src_ip) as src by dest_ip | where src=3 | table dest_ip 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 29 Sep 2020 10:40:46 GMT</pubDate>
    <dc:creator>sundareshr</dc:creator>
    <dc:date>2020-09-29T10:40:46Z</dc:date>
    <item>
      <title>How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286563#M86777</link>
      <description>&lt;P&gt;Using syslog data, how do I find if 3 systems go to a common webpage in a 48 hour period?&lt;/P&gt;

&lt;P&gt;I have 3 IP sources with &lt;CODE&gt;OR&lt;/CODE&gt; between them in a search...&lt;/P&gt;

&lt;P&gt;Do you pipe this to associate and find the destination IP addresses in common?&lt;/P&gt;

&lt;P&gt;Rare values do not seem to work...&lt;/P&gt;

&lt;P&gt;Jim W.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 19:50:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286563#M86777</guid>
      <dc:creator>wingfieldj</dc:creator>
      <dc:date>2016-07-28T19:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286564#M86778</link>
      <description>&lt;P&gt;Please post some sample data, queries that you tried so far and expected output.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 21:25:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286564#M86778</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-07-28T21:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286565#M86779</link>
      <description>&lt;P&gt;Sample data would be good.&lt;/P&gt;

&lt;P&gt;I usually have to enclose my OR searches.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; (10.0.0.0 OR 10.0.0.1 OR 10.0.0.2)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Even better if your fields are extracted. Source and destination IP.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;yourbasesearch | stats count(sourceip) as COUNT destinationip sourceip
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 29 Jul 2016 02:49:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286565#M86779</guid>
      <dc:creator>JDukeSplunk</dc:creator>
      <dc:date>2016-07-29T02:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286566#M86780</link>
      <description>&lt;P&gt;Without knowing much about your data/queries, give this a try. This is assuming src_ip and dest_ip fields are extracted.&lt;BR /&gt;
&lt;STRONG&gt;Update&lt;/STRONG&gt;&lt;BR /&gt;
Updating the field name per comment below&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=foo sourcetype=bar src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333 
| bucket span=2d _time | stats dc(src_ip) as ips by _time dst_ip | where ips=3
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:25:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286566#M86780</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2020-09-29T10:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286567#M86781</link>
      <description>&lt;P&gt;thanks for your responses....&lt;BR /&gt;
so new to complex searches...&lt;/P&gt;

&lt;P&gt;Restating the scenario: Using the firewall logs, I am trying to find common website/destination IP that 3 known users have in common...due to bad guy activity on the src_IP, like malware  &lt;/P&gt;

&lt;P&gt;So I could set a custom filter for the block of time...to remove that complexity.&lt;/P&gt;

&lt;P&gt;I tried the following - no results&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333  type=TRAFFIC | bucket span=2d _time  |  stats dc(src_ip) as ips by  dest_ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The following had 12000 events no matches...But I know they all three had gone to the same dst_ip in the last 2 hours...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333  type=TRAFFIC | bucket span=120m _time  |  stats dc(src_ip) as ips by  dest_ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I tried the following custom time set - no results&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333  type=TRAFFIC |  stats dc(src_ip) as ips by  dest_ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I tried the following custom time set - Error in Stats command&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333)  type=TRAFFIC |  stats count(src_ip) as COUNT dst_ip src_ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The following with custom time set  results in 10085&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333)  type=TRAFFIC| stats count(src_ip) as COUNT
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 15 Aug 2016 13:55:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286567#M86781</guid>
      <dc:creator>wingfieldj</dc:creator>
      <dc:date>2016-08-15T13:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286568#M86782</link>
      <description>&lt;P&gt;Try this to list all dest_ip visited by all three src_ip in the past 2 days&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333 type=TRAFFIC earliest=-2d@d | stats dc(src_ip) as src by dest_ip | where src=3 | table dest_ip 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:40:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286568#M86782</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2020-09-29T10:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286569#M86783</link>
      <description>&lt;P&gt;Can you check if the field dest_ip existing in your events and both src_ip and dest_ip appears in the same event? Your first two searches should've returned result if both fields exists.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:38:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286569#M86783</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2020-09-29T10:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286570#M86784</link>
      <description>&lt;P&gt;yes src_ip and dst_ip are in the same event&lt;/P&gt;

&lt;P&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333 type=TRAFFIC | top 10 dst_ip&lt;/P&gt;

&lt;P&gt;results in 10 ip addresses...and clicking on the ip address will show the events for each of the addresses in the search and some additional addresses...so that is almost it ( not exclusive to the three listed ips)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:41:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286570#M86784</guid>
      <dc:creator>wingfieldj</dc:creator>
      <dc:date>2020-09-29T10:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to search syslog data to find if 3 IP sources hit a common destination IP address in a 48 hour period?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286571#M86785</link>
      <description>&lt;P&gt;There you go, the field name that you were trying is different in your logs (it's dst_ip instead of dest_ip).&lt;/P&gt;

&lt;P&gt;This should work now&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip=111.111.111.111 OR src_ip=222.222.222.222 OR src_ip=333.333.333 type=TRAFFIC | bucket span=2d _time | stats dc(src_ip) as ips by dst_ip
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:38:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-syslog-data-to-find-if-3-IP-sources-hit-a-common/m-p/286571#M86785</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2020-09-29T10:38:32Z</dc:date>
    </item>
  </channel>
</rss>

