Splunk Search

Need to exclude hosts which matched with event 4608 windows is starting up within 5 minutes

HPACHPANDE
Explorer


Below is the query which included all the events for windows shutdown and starting up 

want to exclude host when event 4608 is observed within 5 minutes

index =windows product=Windows
EventCode="4609" OR EventCode="4608" OR EventCode="6008"
| table _time name host dvc EventCode severity Message

please share the query.
Thanks

Labels (1)
Tags (1)
0 Karma
1 Solution

yuanliu
SplunkTrust
SplunkTrust

So you are trying to exclude any event from a host if it has 4608 in the past 5 minutes.  Try

index =windows product=Windows
(EventCode="4609" OR EventCode="4608" OR EventCode="6008") NOT 
    [search index =windows product=Windows EventCode=4608 earliest=-5m
    | stats values(host) as host]
| table _time name host dvc EventCode severity Message

 

View solution in original post

Tags (1)

yuanliu
SplunkTrust
SplunkTrust

Do you mean something like this?

index =windows product=Windows
(EventCode="4609" OR EventCode="4608" OR EventCode="6008")
NOT (EventCode=4608 earliest=-5m)
| table _time name host dvc EventCode severity Message

 

0 Karma

HPACHPANDE
Explorer

HI @yuanliu ,


Thanks for sharing query on this matter.

 

Have reviewed your query concern is like you have excluded the windows starting up event within 5 minutes but it how it will consider the specific "host".

As per my understanding it should be host specific if single host got shutdown and got started up again within 5 minute should not trigger any alert.


0 Karma

yuanliu
SplunkTrust
SplunkTrust

So you are trying to exclude any event from a host if it has 4608 in the past 5 minutes.  Try

index =windows product=Windows
(EventCode="4609" OR EventCode="4608" OR EventCode="6008") NOT 
    [search index =windows product=Windows EventCode=4608 earliest=-5m
    | stats values(host) as host]
| table _time name host dvc EventCode severity Message

 

Tags (1)

gcusello
SplunkTrust
SplunkTrust

Hi @HPACHPANDE ,

please try something like this:

index =windows product=Windows
EventCode="4609" OR EventCode="6008" OR (EventCode="4608" AND _time<now()-300)
| table _time name host dvc EventCode severity Message

I'm not sure that it's possible to add the last condition in the main search, please try, if doesn't run, pleaase try this:

index =windows product=Windows
EventCode="4609" OR EventCode="4608" OR EventCode="6008"
| where EventCode="4608" AND _time<now()-300
| table _time name host dvc EventCode severity Message

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...