Splunk Search

correlate between two sources

khanlarloo
Explorer

hi
i have tow devices, i want to check the result of the same event in tow devices.
for example if one source is blocked in one device on another device what is the action!

Device A = fw=x.x.x.x msg=""Connection Closed" " appName=""General HTTP"" n=366680949 src=150.X.X.55:34884:X1 dst=192.168.x.x:80:X2
Device B = risk=None, event=""Other"", proxy=""://generic:"",, source=""150.X.X.55"", violation=""Invalid hostname"", path=""/"",
method=""GET"", node=""WebApplicationFirewall"", action=""Block""

in device A the ip is connection closed and on the device b the ip is blocked

tanx

Tags (1)
0 Karma

jkat54
SplunkTrust
SplunkTrust
... root / base search...
| rename action as msg 
| rex “Device (?<dvc>\w+)”
| stats latest(msg) by dvc

You’ll need to be in verbose or maybe smart mode for this to work.

0 Karma

khanlarloo
Explorer

if i want to search base on host name how can i write the regex format?
host="12.13.2.1"
host="2.1.1.4"

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...