<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lookup table for search exclusions using a combination of multiple fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526432#M148588</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;That worked. Thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 26 Oct 2020 09:24:09 GMT</pubDate>
    <dc:creator>geoffmoraes</dc:creator>
    <dc:date>2020-10-26T09:24:09Z</dc:date>
    <item>
      <title>Lookup table for search exclusions using a combination of multiple fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526407#M148581</link>
      <description>&lt;P&gt;I have an alert to discover logins from accounts on servers and workstations. Some of these logins are normal and so I am attempting to create an exclusion for these events. This is a discovery process, and a list of normal logins is not known. At the moment, the exclusions are done with individual search commands for readability. But this query search lines are getting bigger by the day.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;base-search&amp;gt;
| search NOT (accountName=svcAPP01 AND computerName=srv-APP1-blah)
| search NOT (accountName=svcAPP02 AND computerName=srv-APP02-*)
| search NOT (accountName=svcAPP03 AND computerName=srv-APP03-blah computerName=ws-somename-blah)
| table _time, accountName, computerName&lt;/LI-CODE&gt;&lt;P&gt;Is it possible to create an inputlookup table for such an exclusion, where the criteria are a combination of two fields; accountName and computerName?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 06:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526407#M148581</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-10-26T06:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Lookup table for search exclusions using a combination of multiple fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526412#M148583</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if you can define all the pairs accountName and computerName and the correlation is always NOT (accountName AND computerName) , you can put them in a lookup (called e.g. search_patterns.csv) containing only two fields (accountName and computerName) and use it in a search, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;your search NOT [ | inputlookup search_patterns.csv | fields accountName computerName ]
| ...&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 07:16:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526412#M148583</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-10-26T07:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Lookup table for search exclusions using a combination of multiple fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526432#M148588</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;That worked. Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 09:24:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526432#M148588</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-10-26T09:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Lookup table for search exclusions using a combination of multiple fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526433#M148589</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Good for you.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking.&lt;/P&gt;&lt;P&gt;Giuseppe.&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 09:28:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Lookup-table-for-search-exclusions-using-a-combination-of/m-p/526433#M148589</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-10-26T09:28:34Z</dc:date>
    </item>
  </channel>
</rss>

