web analytics

rare Сommand in Splunk – Source: socprime.com

Rate this post

Source: socprime.com – Author: Justin Erb

The rare command in Splunk helps you find the least common values in a specific field of your data. This is useful for spotting unusual or infrequent events. By default, the rare command in Splunk returns the 10 least common values for a specified field.

Find Rare User Agents

To identify the least common user agents in your web access logs:

index=web sourcetype=access_logs | rare user_agent 

This returns 10 of the least common user agents.

Identify Uncommon HTTP Status Codes

To detect rare HTTP status codes in your security logs:
Here we set the limit of returns using limit

index=security sourcetype=security_logs | rare http_status_code limit=3

This returns the 3 least common HTTP status codes, helping to spot unusual responses.

Original Post URL: https://socprime.com/blog/rare-%D1%81ommand-in-splunk/

Category & Tags: Blog,Knowledge Bits,Splunk – Blog,Knowledge Bits,Splunk

Views: 5

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post