<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355465#M3410</link>
    <description>&lt;P&gt;Right!... It's a good practice to balance those guys haha! Glad it worked! (I edited the answer)&lt;/P&gt;</description>
    <pubDate>Wed, 31 May 2017 23:07:11 GMT</pubDate>
    <dc:creator>larryjcp</dc:creator>
    <dc:date>2017-05-31T23:07:11Z</dc:date>
    <item>
      <title>Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355462#M3407</link>
      <description>&lt;P&gt;Splunk 6.5.1&lt;BR /&gt;
Splunk Enterprise Security (ES) 4.2.0&lt;/P&gt;

&lt;P&gt;I wrote the correlation search below (show sources that trigger more than 100 IPS alerts) which triggers nicely but I'm trying to add exclusions to get my desired results.  I'm looking to get the output of IPS alerts that only match Severity=4.  I'm also looking to exclude CIDR ranges from the output, ex 10.0.0.0/8.   Any thoughts?   &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats allow_old_summaries=true values(IDS_Attacks.tag) as "tag",c(IDS_Attacks.signature) as "count" from datamodel=Intrusion_Detection where nodename=IDS_Attacks by "IDS_Attacks.src"  | rename "IDS_Attacks.src" as "src" | where 'count'&amp;gt;100 | rename "tag" as "orig_tag"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 28 Apr 2017 20:31:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355462#M3407</guid>
      <dc:creator>bwoltz</dc:creator>
      <dc:date>2017-04-28T20:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355463#M3408</link>
      <description>&lt;P&gt;Hi bwoltz. See my suggestion below:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats allow_old_summaries=true values(IDS_Attacks.tag) as "tag",c(IDS_Attacks.signature) as "count"  from datamodel=Intrusion_Detection where nodename=IDS_Attacks by "IDS_Attacks.src"  
| `drop_dm_object_name("IDS_Attacks")`
| where 'count'&amp;gt;100 AND  severity=4 AND NOT cidrmatch("10.0.0.0/8",src)
| rename "tag" as "orig_tag"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;| &lt;CODE&gt;drop_dm_object_name("IDS_Attacks")&lt;/CODE&gt; - is a macro that allows to drop the data model object name &lt;/P&gt;

&lt;P&gt;Hope it works!&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 05:48:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355463#M3408</guid>
      <dc:creator>larryjcp</dc:creator>
      <dc:date>2017-05-31T05:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355464#M3409</link>
      <description>&lt;P&gt;larryjcp, if I remove the parenthesis to the left of count it works like a charm.  Thanks!!!&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 21:08:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355464#M3409</guid>
      <dc:creator>bwoltz</dc:creator>
      <dc:date>2017-05-31T21:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355465#M3410</link>
      <description>&lt;P&gt;Right!... It's a good practice to balance those guys haha! Glad it worked! (I edited the answer)&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 23:07:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355465#M3410</guid>
      <dc:creator>larryjcp</dc:creator>
      <dc:date>2017-05-31T23:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: Adding exclusions to my Correlation Search for IPS?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355466#M3411</link>
      <description>&lt;P&gt;Since 7.1.1, when a field is multivalue, after the rename (included in the drop_dm_object_name macro) it's no longer a MV field.&lt;BR /&gt;
Splunk changed something in the rename commande, and it has broken the multivalue capability.&lt;BR /&gt;
Sad !&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:22:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-Adding-exclusions-to-my-Correlation/m-p/355466#M3411</guid>
      <dc:creator>Azerty728</dc:creator>
      <dc:date>2020-09-29T20:22:39Z</dc:date>
    </item>
  </channel>
</rss>

