{"id":62466,"date":"2022-08-29T14:17:35","date_gmt":"2022-08-29T14:17:35","guid":{"rendered":"https:\/\/merikebi.warrenmyers.com\/?p=62466"},"modified":"2022-08-29T14:17:35","modified_gmt":"2022-08-29T14:17:35","slug":"answer-by-warren-for-how-do-i-check-if-splunk-has-received-logs-from-hundreds-of-different-sources-hosts-devices","status":"publish","type":"post","link":"https:\/\/merikebi.warrenmyers.com\/?p=62466","title":{"rendered":"Answer by warren for How do I check if Splunk has received logs from hundreds of different sources\/hosts\/devices?"},"content":{"rendered":"<p>Searching for non-existent data is always harder than searching for existing data &#8230; because finding &quot;nothing&quot; isn&#8217;t possible<\/p>\n<p>However, you <em>can<\/em> simulate finding nothing like this:<\/p>\n<pre><code>index=ndx sourcetype=srctp ip=* earliest=-7d\n| stats count by ip\n| append \n    [| inputlookup myListOfIPs\n    | fields ip ]\n| stats values(count) as filter by ip\n| where isnull(filter)\n<\/code><\/pre>\n<p>That this search does:<\/p>\n<ul>\n<li>do a simple count by all found IPs of the last week<\/li>\n<li>append the &quot;master list&quot; of IPs to the <code>stats<\/code>&#8216;d output<\/li>\n<li>do a <em>values<\/em> <a href=\"https:\/\/docs.splunk.com\/Documentation\/Splunk\/latest\/SearchReference\/stats\" rel=\"nofollow noreferrer\">`stats<\/a> of all IPs in the table (found in event data and from the lookup table)<\/li>\n<li>filter out all items that have some value in the <code>filter<\/code> field using <a href=\"https:\/\/docs.splunk.com\/Documentation\/Splunk\/latest\/SearchReference\/where\" rel=\"nofollow noreferrer\"><code>where<\/code><\/a><\/li>\n<\/ul>\n<p>The resultant IPs will all have not been found in the index in question in the last week<\/p>\n<p>Adjust field names, time range, etc as necessary<\/p>\n<p>from User warren &#8211; Stack Overflow https:\/\/stackoverflow.com\/questions\/73464448\/how-do-i-check-if-splunk-has-received-logs-from-hundreds-of-different-sources-ho\/73530093#73530093<br \/>\nvia <a href=\"https:\/\/ifttt.com\/?ref=da&#038;site=wordpress\">IFTTT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Searching for non-existent data is always harder than searching for existing data &#8230; because finding &quot;nothing&quot; isn&#8217;t possible However, you can simulate finding nothing like this: index=ndx sourcetype=srctp ip=* earliest=-7d | stats count by ip | append [| inputlookup myListOfIPs | fields ip ] | stats values(count) as filter by ip | where isnull(filter) That &hellip;<br \/><a href=\"https:\/\/merikebi.warrenmyers.com\/?p=62466\" class=\"more-link pen_button pen_element_default pen_icon_arrow_double\">Continue reading <span class=\"screen-reader-text\">Answer by warren for How do I check if Splunk has received logs from hundreds of different sources\/hosts\/devices?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[991],"keyring_services":[],"class_list":["post-62466","post","type-post","status-publish","format-standard","hentry","category-blih","tag-stackexchange"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/posts\/62466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=62466"}],"version-history":[{"count":1,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/posts\/62466\/revisions"}],"predecessor-version":[{"id":62467,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=\/wp\/v2\/posts\/62466\/revisions\/62467"}],"wp:attachment":[{"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=62466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=62466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=62466"},{"taxonomy":"keyring_services","embeddable":true,"href":"https:\/\/merikebi.warrenmyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fkeyring_services&post=62466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}