Dashboards & Visualizations

Different data from Splunk and Sophos Central

zksvc
Contributor

Dear Everyone,

I would like to create a custom correlation search to identify hostnames that have not been updated in one month or 30 days or longer. However, upon finalizing my query, I encountered a discrepancy in the data. For instance, I found that the hostname "ABC" has not been updated for 41 days; however, when I checked in Sophos Central via the website, it indicated "No Devices Found." I am inquiring about how Splunk is able to read this data while Sophos Central reports that the device is not found.

Thank you for your assistance.

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @zksvc ,

you could extract from splunk the list of hostnames with a simple search index=* | stats count BY host.

Then you could elaborate these results e.g. using nslookup to have the hostnames when you have the IPs and viceversa, at the same time, when you have an FQDN, you could extract the hostname using a regex, but it depends on your data.

In this way, you couls have a list of hosts whose logs are monitored by Splunk and you can match them with the Sophos list using e.g. Excel.

Otherwise, if you planned to ingest Sophos logs in Splunk, you can do this match in Splunk.

Ciao.

Giuseppe

View solution in original post

zksvc
Contributor

I have not set up the ingest from Sophos to Splunk yet. I am currently looking to create a custom correlation search. However, if you know how to verify the data, please let me know.

The query I've crafted clearly identifies all the necessary details such as hostname, IP, and username. The issue of uppercase/lowercase is not a problem, as it only requires output without the need to compare data.

I've been quite troubled trying to sort this out, which has led me to this point.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @zksvc ,

you could extract from splunk the list of hostnames with a simple search index=* | stats count BY host.

Then you could elaborate these results e.g. using nslookup to have the hostnames when you have the IPs and viceversa, at the same time, when you have an FQDN, you could extract the hostname using a regex, but it depends on your data.

In this way, you couls have a list of hosts whose logs are monitored by Splunk and you can match them with the Sophos list using e.g. Excel.

Otherwise, if you planned to ingest Sophos logs in Splunk, you can do this match in Splunk.

Ciao.

Giuseppe

zksvc
Contributor

Hi @gcusello 
Nice idea my friend, thanks for your answer

Danke 

Zake

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @zksvc ,

you're asking of data quality: how data are ingested in Splunk?

is this input the same of Sophos?

then, you shuld analyze if there's some difference caused by the hostname extraction: Ip instead hostname, FQDN or hostname, uppercase or lowercase?

You should perform an analysis on the hostnames and Splunk gives you all the tools to search and analyze them.

Ciao.

Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...