<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424698#M121792</link>
    <description>&lt;P&gt;I am trying to monitor an application where remote users with different GeoLoc(s) and unique sourceIP(s) login and interact with the application.&lt;/P&gt;

&lt;P&gt;In an effort to monitor behavior for possible credential theft/ inappropriate access, I am looking to create a historic sourceIP and GeoLoc list, and compare last 24 hours of logins against the list.&lt;/P&gt;

&lt;P&gt;so far I have been testing &lt;/P&gt;

&lt;P&gt;index=waf sourcetype=waf_logs "a few key words" | stats values(sourceIP) values(GeoLoc) by userID | outputlookup append=f historic_login_list.csv   (I run this for last 30 days but not include current day). &lt;/P&gt;

&lt;P&gt;The part I am fumbling with is how to check the list with a search for past 24 hours.  I am not getting the correct  " |lookup output" or there is something else wrong.&lt;/P&gt;

&lt;P&gt;I will keep working on this in parallel, however if someone has a better way to do this, or experience with this, please advise.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 20:18:30 GMT</pubDate>
    <dc:creator>Log_wrangler</dc:creator>
    <dc:date>2020-09-29T20:18:30Z</dc:date>
    <item>
      <title>How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424698#M121792</link>
      <description>&lt;P&gt;I am trying to monitor an application where remote users with different GeoLoc(s) and unique sourceIP(s) login and interact with the application.&lt;/P&gt;

&lt;P&gt;In an effort to monitor behavior for possible credential theft/ inappropriate access, I am looking to create a historic sourceIP and GeoLoc list, and compare last 24 hours of logins against the list.&lt;/P&gt;

&lt;P&gt;so far I have been testing &lt;/P&gt;

&lt;P&gt;index=waf sourcetype=waf_logs "a few key words" | stats values(sourceIP) values(GeoLoc) by userID | outputlookup append=f historic_login_list.csv   (I run this for last 30 days but not include current day). &lt;/P&gt;

&lt;P&gt;The part I am fumbling with is how to check the list with a search for past 24 hours.  I am not getting the correct  " |lookup output" or there is something else wrong.&lt;/P&gt;

&lt;P&gt;I will keep working on this in parallel, however if someone has a better way to do this, or experience with this, please advise.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:18:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424698#M121792</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2020-09-29T20:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424699#M121793</link>
      <description>&lt;P&gt;So if my understanding is correct, you are trying to compare last 30days of data (GeoLoc,sourceIP) with current date?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jul 2018 23:17:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424699#M121793</guid>
      <dc:creator>nadlurinadluri</dc:creator>
      <dc:date>2018-07-09T23:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424700#M121794</link>
      <description>&lt;P&gt;Hi @Log_wrangler ,&lt;BR /&gt;
From your search, you are updating multi valued fields to lookup file and trying to match against that. Instead of stats, you could use table to print ouft your fields &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=waf sourcetype=waf_logs "a few key words" |table sourceIP ,GeoLoc ,userID |dedup sourceIP ,GeoLoc ,userID | outputlookup append=f historic_login_list.csv
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Once you have the lookup table ,then you could find the difference by&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search  NOT [inputlookup historic_login_list.csv |fields sourceIP ]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Jul 2018 03:38:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424700#M121794</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-10T03:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424701#M121795</link>
      <description>&lt;P&gt;Thank you for your reply.&lt;/P&gt;

&lt;P&gt;I like your approach to search based on NOT on the input csv.&lt;/P&gt;

&lt;P&gt;In theory I thought that would work, the format is showing userID and address address address, so the matching is off.&lt;/P&gt;

&lt;P&gt;To clarify each userID can have multiple sourceIP(s).   I need to know if a pair (userID, sourceIP) matches the historic list.  Currently the output of the list is  userID, sourceIP sourceIP sourceIP, which causes the problem.&lt;/P&gt;

&lt;P&gt;I hope that makes sense.&lt;/P&gt;

&lt;P&gt;Originally I was trying to create fields userID  sourceIP flag on the historic list, and then use the flag values (e.g. flag = 1) to filter a yes or no on_list... but I could not get it to work right.&lt;/P&gt;

&lt;P&gt;I would need to dedup pairs somehow.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2018 13:46:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424701#M121795</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2018-07-10T13:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424702#M121796</link>
      <description>&lt;P&gt;Using your "NOT" logic... I think this is working correctly, please advise&lt;/P&gt;

&lt;P&gt;To create the list (historic time period not including last 24hrs)&lt;/P&gt;

&lt;P&gt;index=waf sourcetype=waf_logs "a few key words" |table sourceIP userID | outputlookup append=f historic_login_list.csv &lt;/P&gt;

&lt;P&gt;This creates duplicates which make the list longer, but until I can figure out how to dedup the pairs of userID and sourceIP, it will do, until it gets too big and crashes something&lt;/P&gt;

&lt;P&gt;To check the list (last 24 hrs) &lt;/P&gt;

&lt;P&gt;index=waf sourcetype=waf_logs "a few key words" | table sourceIP userID | search NOT [|inputlookup historic_login_list.csv |fields sourceIP userID]&lt;/P&gt;

&lt;P&gt;This seems to work.   Is there a better way?   Any 2nd opinion greatly appreciated.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:24:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424702#M121796</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2020-09-29T20:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424703#M121797</link>
      <description>&lt;P&gt;Just to clarify , what's the output of your historic SPL - userID, sourceIP sourceIP sourceIP ? Can it be constrained to userID,sourceIP ?&lt;/P&gt;

&lt;P&gt;To make the search working, try this &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;" your base search running for last 24  hours" |fields userID, sourceIP|search NOT [inputlookup historic_login_list.csv |fields userID, sourceIP ]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Jul 2018 14:13:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424703#M121797</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-10T14:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424704#M121798</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| dedup userID sourceIP
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Jul 2018 17:09:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424704#M121798</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-10T17:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424705#M121799</link>
      <description>&lt;P&gt;I want to give you 5 points for helping me out with the subsearch-filter logic, i.e. NOT [inputlookup historic_logon_list.csv....]&lt;/P&gt;

&lt;P&gt;as I only have so few points, the real value is about 500 pts.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:24:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424705#M121799</guid>
      <dc:creator>Log_wrangler</dc:creator>
      <dc:date>2020-09-29T20:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424706#M121800</link>
      <description>&lt;P&gt;@Log_wrangler , no worries &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; , you could eliminate the duplicates using &lt;CODE&gt;dedup&lt;/CODE&gt; ie. dedup userID, sourceIP&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 01:12:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424706#M121800</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-11T01:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to outputlookup historic IP activity / userID  and create an alert that will occur if the IP address is not on the historic IP activity list?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424707#M121801</link>
      <description>&lt;P&gt;Just click on the &lt;CODE&gt;^&lt;/CODE&gt; to &lt;CODE&gt;UpVote&lt;/CODE&gt; helpful answers and comments (this gives points but does not cost you points).&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 17:34:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-outputlookup-historic-IP-activity-userID-and-create-an/m-p/424707#M121801</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-11T17:34:06Z</dc:date>
    </item>
  </channel>
</rss>

