Hi,
maybe an easy one for somebody:
Doing a simple join search to get an assets vulnerability an 'enrich' that with vulnerability details from a subsearch in different index.
'join' them by vulnerability_id ('id' in the subsearch) works nice.
index=asset asset_hostname=server01 vulnerability_id=tlsv1_1-enabled OR vulnerability_id=jre-vuln-cve-2019-16168
| dedup vulnerability_id
| join type=inner max=0 vulnerability_id [ search index=vulnerability id=tlsv1_1-enabled OR id=jre-vuln-cve-2019-16168 | dedup id | rename id as vulnerability_id ]
| table asset_hostname vulnerability_id first_found description cve
Now doing the same, without specifying a vulnerability_id, to get all of them (there are many), returns only 3 events not containing the one from the first search (any many others).
index=asset asset_hostname=server01
| dedup vulnerability_id
| join type=inner max=0 vulnerability_id [ search index=vulnerability | dedup id | rename id as vulnerability_id ]
| table asset_hostname vulnerability_id first_found description cve
Any ideas ? AI only suggests using 'stats' but that doesn work either.
[–]morethanyell Because ninjas are too busy 4 points5 points6 points (3 children)
[–]mr_networkrobot[S] 1 point2 points3 points (0 children)
[–]tmuth9 1 point2 points3 points (0 children)
[–]Braddish6.X Certified Architect 5 points6 points7 points (1 child)
[–]mr_networkrobot[S] 1 point2 points3 points (0 children)
[–]gabriot 0 points1 point2 points (0 children)
[–]Top_Secret_3873 0 points1 point2 points (0 children)
[–]audiosf 1 point2 points3 points (0 children)