Splunk Search

correlate between two sources

khanlarloo
Explorer

hi
i have tow devices, i want to check the result of the same event in tow devices.
for example if one source is blocked in one device on another device what is the action!

Device A = fw=x.x.x.x msg=""Connection Closed" " appName=""General HTTP"" n=366680949 src=150.X.X.55:34884:X1 dst=192.168.x.x:80:X2
Device B = risk=None, event=""Other"", proxy=""://generic:"",, source=""150.X.X.55"", violation=""Invalid hostname"", path=""/"",
method=""GET"", node=""WebApplicationFirewall"", action=""Block""

in device A the ip is connection closed and on the device b the ip is blocked

tanx

Tags (1)
0 Karma

jkat54
SplunkTrust
SplunkTrust
... root / base search...
| rename action as msg 
| rex “Device (?<dvc>\w+)”
| stats latest(msg) by dvc

You’ll need to be in verbose or maybe smart mode for this to work.

0 Karma

khanlarloo
Explorer

if i want to search base on host name how can i write the regex format?
host="12.13.2.1"
host="2.1.1.4"

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...