Splunk Search

How to develop a search to find auditing activity that began on a specific date?

digital_alchemy
Path Finder

Scenario:

We have auditing activity that began on a specific day. I would like to search the firewall logs for activity from src_ip addresses that do not exist in the logs prior to that date for at least a couple of months.

Any suggestions on how to specify that I only want the results of new IP addresses seen for the first time during a specific timeframe?

Tags (4)
0 Karma
1 Solution

somesoni2
Revered Legend

One long running slow version, could be like this (assuming specific date is Jan 2nd 2017)

your base search spanning 2 months of time range | stats min(_time) as firstReceived by src_ip | where firstReceived >=strptime("2017-01-02","%Y-%m-%d")

View solution in original post

0 Karma

somesoni2
Revered Legend

One long running slow version, could be like this (assuming specific date is Jan 2nd 2017)

your base search spanning 2 months of time range | stats min(_time) as firstReceived by src_ip | where firstReceived >=strptime("2017-01-02","%Y-%m-%d")
0 Karma

digital_alchemy
Path Finder

Thanks, that works perfectly... and such a simple solution.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...