Search Command> Coalesce
This blog post is part of a challenge or a “blog-a-thon” in my group of Sales Engineers. The challenge is to see who could blog about some of the least used Splunk search commands. I chose coalesce because it does not come up often.
When might you use the coalesce command?
“Defense in depth” is an older methodology used for perimeter security. The concept includes creating multiple barriers the “hacker” must cross before penetrating an environment. Part of the practice of making it difficult for someone with malicious intent includes using multiple vendors at certain layers. For example, at any given moment in time, one vendor’s firewall may have exploitable vulnerabilities whereas another’s may not. Theoretically, this leaves …