Hi @sarge338 , let me understand: you have three syslog sources to ingest in Splunk, and then you whould compare events from the three sources, is it correct? if this is your requirements you shoul...
See more...
Hi @sarge338 , let me understand: you have three syslog sources to ingest in Splunk, and then you whould compare events from the three sources, is it correct? if this is your requirements you should follow these preliminary steps to ingest data (if you already ingested data jump these steps): identify the data type (technology, model, type of data), identify IP address, protocol and port of each source, identify the correct Add-on to parse these data source, put in listening your heavy forwarder on the defined ports and protocols, configure your sources to send logs to the heavy forwarder using the defined protocol and port, configure the input on heavy forwarder assigning the correct sourcetype (based on the choosed Add-On) and the correct index, the host is automatically assigned using the IP address. then in your Splunk you can run a search like the following (Not having any information on data sources I cannot be detailed and I could be vague): index=your_index host IN (M1, M2, M3)
| stats dc(host) AS host_count BY _time
| where host_count=3 if the timestamps must be exactly the same, if instead they must be similar (e.g. 5 minutes ranges), you could run: index=your_index host IN (M1, M2, M3)
| bin span=5m _time
| stats dc(host) AS host_count BY _time
| where host_count=3 In this way you have the events with the same timestamp in all the hosts, if you want a different condition, you have to modify the final where command. Ciao. Giuseppe