Splunk Search

How to create a query for alerting two different events from the same host?

Splunk77
Explorer

I am working on a query to report on host/s that have triggered two different event types. For example windows event IDs 4697 and 4698, if triggered by the same host, rule must alert.

 

EventType =4697

EventType =4698

HostName=What is the best way to imply host name being unique to the eventtypes.

To further clarify, if the same host triggers 4697 and 4698 in a 5 minute window, I want to report on that. 

Thanks in advance.

Labels (1)
0 Karma

norbertt911
Communicator

index="windows_events" Eventtype=4697 OR Eventtype=4698 |stats count by Hostname

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...