<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOC Inputlookup in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489965#M194104</link>
    <description>&lt;P&gt;Hi Hars,&lt;/P&gt;

&lt;P&gt;unfortunately it didn't work, no events showed.&lt;/P&gt;

&lt;P&gt;Would you please advice?&lt;/P&gt;</description>
    <pubDate>Fri, 01 May 2020 16:42:47 GMT</pubDate>
    <dc:creator>zayedaljaberi</dc:creator>
    <dc:date>2020-05-01T16:42:47Z</dc:date>
    <item>
      <title>IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489963#M194102</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;

&lt;P&gt;my goal is to detect if there is any matches with my custom Domain_IOC.csv list and display additional column for the note.&lt;/P&gt;

&lt;P&gt;Domain_IOC.csv list includes &lt;STRONG&gt;two columns&lt;/STRONG&gt;&lt;BR /&gt;
Domain and ioc_note (example picture attached of lookup table)&lt;IMG src="https://community.splunk.com/storage/temp/291637-splunk-ioc-example.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;I want the output to be if there was matches with domain is to include the ioc_note column as well.&lt;/P&gt;

&lt;P&gt;Current Query I have (Which provides me the matches with domain but doesn't include ioc_note column)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=dns sourcetype="dnslog" [|inputlookup Domain_IOC.csv |fields Domain]
| eval Date=strftime(_time, "%Y-%m-%d %H:%M:%S") 
| stats values(Domain) as IOC by Date,host,Account,IP,Action
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For your kind support.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:16:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489963#M194102</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-09-30T05:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489964#M194103</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Please try below seaarch&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=dns sourcetype="dnslog"
| stats values(Domain) as Domain by _time,host,Account,IP,Action
| lookup Domain_IOC.csv Domain as Domain OUTPUT ioc_note
| where isnotnull(ioc_note)
| eval Date=strftime(_time, "%Y-%m-%d %H:%M:%S") 
| fields - _time
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 01 May 2020 12:05:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489964#M194103</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-05-01T12:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489965#M194104</link>
      <description>&lt;P&gt;Hi Hars,&lt;/P&gt;

&lt;P&gt;unfortunately it didn't work, no events showed.&lt;/P&gt;

&lt;P&gt;Would you please advice?&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 16:42:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489965#M194104</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-05-01T16:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489966#M194105</link>
      <description>&lt;P&gt;If you run below query, are you getting any result ?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=dns sourcetype="dnslog"
 | stats values(Domain) as Domain by _time,host,Account,IP,Action
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 04 May 2020 08:32:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489966#M194105</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-05-04T08:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489967#M194106</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;No results based on your query&lt;/P&gt;

&lt;P&gt;to verify that i'm receiving the events in the screenshot below&lt;BR /&gt;
&lt;IMG src="https://i.ibb.co/p001GnR/sample-dns.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 13:24:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489967#M194106</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-05-05T13:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489968#M194107</link>
      <description>&lt;P&gt;Try below query&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=dns sourcetype="dnslog"
| stats count by _time,Domain,host,Action
| lookup Domain_IOC.csv Domain as Domain OUTPUT ioc_note
| where isnotnull(ioc_note)
| eval Date=strftime(_time, "%Y-%m-%d %H:%M:%S") 
| fields - _time
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 05 May 2020 14:05:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489968#M194107</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-05-05T14:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489969#M194108</link>
      <description>&lt;PRE&gt;&lt;CODE&gt; index=dns sourcetype="dnslog" [|inputlookup Domain_IOC.csv | fields Domain]
 | stats count by _time, Domain, Action, Category
 | inputlookup append=t Domain_IOC.csv
 | eval Domain=trim(Domain,".")
 | eval Domain=trim(Domain,"*")
 | sefljoin Domain
 | eval Date=strftime(_time, "%Y-%m-%d %H:%M:%S") 
 | fields - _time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi folks&lt;BR /&gt;
&lt;EM&gt;Domain&lt;/EM&gt; in search has extra &lt;CODE&gt;.(dot)&lt;/CODE&gt; and &lt;EM&gt;Domain&lt;/EM&gt; in lookup has extra &lt;CODE&gt;*(astarisk)&lt;/CODE&gt;.&lt;BR /&gt;
These can't match by &lt;CODE&gt;lookup&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 16:10:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489969#M194108</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-05-05T16:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: IOC Inputlookup</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489970#M194109</link>
      <description>&lt;P&gt;Nice find I didn’t notice extra dot and wildcard in lookup. However you can do wildcard lookup and it is possible have a look at my answer &lt;A href="https://answers.splunk.com/answers/596835/how-to-search-for-values-in-a-lookup-table-with-wi.html"&gt;https://answers.splunk.com/answers/596835/how-to-search-for-values-in-a-lookup-table-with-wi.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 16:46:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-Inputlookup/m-p/489970#M194109</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-05-05T16:46:57Z</dc:date>
    </item>
  </channel>
</rss>

