Splunk Search

Passive DNS

kjstogn
Explorer

I am trying to create a passive dns collection based on splunk stream data. My current SPL is this:

index=botsv2 sourcetype=stream:dns query=*frothly.local
| stats earliest(_time) as firstSeen, latest(_time) as lastSeen by query
| eval firstSeen=strftime(firstSeen, "%m/%d/%Y %H:%M:%S")
| eval lastSeen=strftime(lastSeen, "%m/%d/%Y %H:%M:%S")

What I am trying to accomplish is show how many days as "activeDays" a query was made. Just because its first and last may be seen 30 days apart it may have only been queried a couple times. 

Also the stream queries and answers are separate events and how would i join them to create a by query and answers

 

Labels (1)
Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Here's an untested search to find out how many separate days each query was made.  It has the side effect of retaining only the date of each query, not the time.

index=botsv2 sourcetype=stream:dns query=*frothly.local
| bin span=1d _time
| stats earliest(_time) as firstSeen, latest(_time) as lastSeen, dc(_time) as queryDays by query
| eval firstSeen=strftime(firstSeen, "%m/%d/%Y %H:%M:%S")
| eval lastSeen=strftime(lastSeen, "%m/%d/%Y %H:%M:%S")

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...