Splunk Search

Transaction to show events with more than 1 source only

axinjakson
Explorer

I am attempting to search across 3 different sources and provide events that occur on more than 1 source only. Meaning firewall1 and firewall2 saw events in say, the same 20 minute window...

I am able to do this with a huge "stats values" table output and "search where" after, however I feel that is terribly inefficient.

Looking for something to output either raw event logs or to a table is fine, stats with count, etc etc. I am open to suggestions.

Here is my basic thought for the search, attempting src+dst IP pairs as the unique identifier

source1 OR source2 OR source3 | transaction src,dst where source>1 maxspan=20m

0 Karma
1 Solution

Ayn
Legend

You could use streamstats to get a distinct count of sources for each transaction and then single out the transactions with more than one source using where:

source="source1" OR source="source2" OR source="source3" | transaction src,dst maxspan=20m | streamstats window=1 dc(source) AS sourcecount | where sourcecount>1

View solution in original post

Ayn
Legend

You could use streamstats to get a distinct count of sources for each transaction and then single out the transactions with more than one source using where:

source="source1" OR source="source2" OR source="source3" | transaction src,dst maxspan=20m | streamstats window=1 dc(source) AS sourcecount | where sourcecount>1
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...