Splunk Search

Comparing results from three separate events

venomousmoose
Engager

Forgive my ignorance if this has been answered elsewhere, I did my best to search for an answer but have not found it.

I am trying to compare three different search results for three separate events for specific time periods. Here are the strings I'm searching for:

1. user=BeerNFries OR ComputerName=xyz.local OR srcip="123.123.123.123"
2. user=Id10T OR ComputerName=123.local OR srcip="111.111.111.111"
3. user=PhishMe OR ComputerName=456.local OR srcip="222.222.222.222"

Where:
Event 1 occurred 9/17/2017 between 11:45 - 11:48
Event 2 occurred 8/19/2017 between 14:15 - 14:20
Event 3 occurred 9/12/2017 between 15:21 - 15:39

How would I be able to compare what happened during these times to look for similarities?

Tags (1)
0 Karma
1 Solution

sduff_splunk
Splunk Employee
Splunk Employee

Are you wanting to get all the events for each one of those time periods in the one search? If so,

(user=BeerNFries OR ComputerName=xyz.local OR srcip="123.123.123.123" earliest="9/17/2017:11:45:00" latest="9/17/2017:11:48:00" ) OR (user=Id10T OR ComputerName=123.local OR srcip="111.111.111.111" earliest="8/19/2017:14:45:00" latest="8/19/2017:14:20:00") OR (user=PhishMe OR ComputerName=456.local OR srcip="222.222.222.222" earliest="9/12/2017:15:21:00" latest="9/12/2017:15:39:00")

View solution in original post

DalJeanis
Legend

Okay, this is a big wide broad open clean slate of a question, especially since you have withheld a lot of the information that would allow us to be more specific..

I believe when you say "event" you don't mean the technical term, "a specific record in the Splunk database", I believe you mean "a set of things that happened that we are worried about."

So, the first thing that I would do is dump all the events from all indexes related to each of those time frames for any of those users, IPs and computernames, and put all of them into a purpose-build summary index, to save you from having to pull them repeatedly.

I would identify the types of records that are in there, and then run a scan across the entire time frame to see how common each of those types of events is. Since you are only looking at a few minutes, it shouldn't be that difficult to isolate what events are there, and then look for other clusters of the same events, not associated with whatever worries you, so you can compare and identify any differences.

If you'd like to be more specific, then we can probably help more.

0 Karma

venomousmoose
Engager

What I'm looking for is activity before and after a virus alert on three different computers on three different days. I'm trying to figure out if there any similar activities (websites visited, emails received, etc...) just before the events that could have triggered the alert.

0 Karma

sduff_splunk
Splunk Employee
Splunk Employee

Are you wanting to get all the events for each one of those time periods in the one search? If so,

(user=BeerNFries OR ComputerName=xyz.local OR srcip="123.123.123.123" earliest="9/17/2017:11:45:00" latest="9/17/2017:11:48:00" ) OR (user=Id10T OR ComputerName=123.local OR srcip="111.111.111.111" earliest="8/19/2017:14:45:00" latest="8/19/2017:14:20:00") OR (user=PhishMe OR ComputerName=456.local OR srcip="222.222.222.222" earliest="9/12/2017:15:21:00" latest="9/12/2017:15:39:00")
Get Updates on the Splunk Community!

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...

Alerting Best Practices: How to Create Good Detectors

At their best, detectors and the alerts they trigger notify teams when applications aren’t performing as ...

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...