Splunk Search

Complex request improvement

jip31
Motivator

Hi

I would like to improve this complex request :

(sourcetype=powershell:rebootPending) |stats latest(Reboot_Pending) as Reboot_Pending by host | eval Reboot_Pending=if(like("True", "False"), "Yes", "No")

|append [ search (index=windows sourcetype=tools:flags filename=*TOUPDATE*) |eval flagExists="Yes" ]

|append [

search source="Autologon_install.log"  sourcetype="autologon:install" 

| rex "(?m)(?(.*))[\r\n]*\z" 

| search NOT last_line="*Autologon*"

| stats latest(last_line) as last_line by host

| eval Autologon_Error=if(like(last_line,"%Installation complete.%"), "No", "Yes")

]

|append [

search index=_internal host=TOL*|stats latest(_time) as _time by host|eval Ping_Status=if(_time>now()-60,"OK","KO") ]

|stats values(flagExists) as flagExists, values(Reboot_Pending) as Reboot_Pending, values(Autologon_Error) as Autologon_Error, values(Ping_Status) as Ping_Status by host | fillnull value="No" flagExists

1) I would like to use a loop because tools:flags filename=TOUPDATE exists only sometimes
So i would like to have something like this :
" if flagExists="No" then do nothing, if flagExists="Yes" then..... (equest launching)
2) The second thing i would like to do is for this piece of code:
search index=_internal host=TOL*|
In fact, host correspond to the hostname of a computer
But this hostname can begin with many different ways : BLL, HAL....
So want can i do for taking into account all these case?
3) The last thing is for this code : Ping_Status=if(_time>now()-60,"OK","KO") ]
Here, i monitore the SPLUNK service for knowing if the computer ping on network
But i would prefer to monitore the network directy
How to proceed please?
Thanks a lot

Tags (1)
0 Karma

jip31
Motivator

i m going to try but in this case it's not easy....
1) I use the variable below and i would like to specify a condition like this:

if flagExists="No" then do nothing, if flagExists="Yes" then....

2) in the request i use a hostname whick starts with many different characters
actually i use only this :

host=TOL*|

But the host can sart with B or H
How i can do?

THANKS

0 Karma

woodcock
Esteemed Legend

These kinds of questions work MUCH better if you post a minimalized sample data set and a mockup of the desired final outcome. You have too much going on for me to follow with just descriptions and sub-optimal SPL. Do consider editing your post in this way and I will have a crack at it.

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...