Splunk Search

Using fireall logs to find hosts that do not use a specific protocol

john_byun
Path Finder

I have the following query for PAN firewall logs:

index=pan app=ssl

| stats count by src

This would give me a list of all src IPs of devices that use SSL.  How would I create a query to give me the opposite results?  I want the list of src IPs that never have SSL traffic.

Labels (1)
0 Karma

DalJeanis
Legend

Here's one way:

index=pan app=*
| stats count by src app
| where app!="ssl"

 

Here's another:

index=pan app!="ssl"
| stats count by src

 

0 Karma

john_byun
Path Finder

I am looking to list all src's that do not use ssl.  Your query basically gives me the same results because all src's use multiple apps.

Is there a way to do this without me doing a massive diff of tens of thousands of results?

0 Karma

DalJeanis
Legend

Try this

index=pan app=*
| stats count values(app) as app by src
| where NOT (app="ssl")

 

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...