Splunk Search

correlate between two sources

khanlarloo
Explorer

hi
i have tow devices, i want to check the result of the same event in tow devices.
for example if one source is blocked in one device on another device what is the action!

Device A = fw=x.x.x.x msg=""Connection Closed" " appName=""General HTTP"" n=366680949 src=150.X.X.55:34884:X1 dst=192.168.x.x:80:X2
Device B = risk=None, event=""Other"", proxy=""://generic:"",, source=""150.X.X.55"", violation=""Invalid hostname"", path=""/"",
method=""GET"", node=""WebApplicationFirewall"", action=""Block""

in device A the ip is connection closed and on the device b the ip is blocked

tanx

Tags (1)
0 Karma

jkat54
SplunkTrust
SplunkTrust
... root / base search...
| rename action as msg 
| rex “Device (?<dvc>\w+)”
| stats latest(msg) by dvc

You’ll need to be in verbose or maybe smart mode for this to work.

0 Karma

khanlarloo
Explorer

if i want to search base on host name how can i write the regex format?
host="12.13.2.1"
host="2.1.1.4"

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...