<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blacklist lookup for syslogs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-lookup-for-syslogs/m-p/591435#M205896</link>
    <description>&lt;P&gt;Assuming src and DST are already extracted and you don't already have a domain field extracted in your events, you could try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| lookup blacklist.csv IP as src
| lookup blacklist.csv IP as DST
| where isnotnull(domain)&lt;/LI-CODE&gt;</description>
    <pubDate>Wed, 30 Mar 2022 08:14:26 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2022-03-30T08:14:26Z</dc:date>
    <item>
      <title>How to blacklist lookup for syslogs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-lookup-for-syslogs/m-p/591428#M205891</link>
      <description>&lt;P&gt;I have a blacklist.csv file that looks like the following,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="0" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="17"&gt;IP&lt;/TD&gt;
&lt;TD&gt;domain&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="17"&gt;1.0.136.29&lt;/TD&gt;
&lt;TD&gt;# 2018-11-12, node-1lp.pool-1-0.dynamic.totbb.net, THA, 2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="17"&gt;1.0.136.215&lt;/TD&gt;
&lt;TD&gt;# 2018-10-06, node-1qv.pool-1-0.dynamic.totbb.net, THA, 2&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i want to scan my syslog events and see if any IP address match the IPs in this blacklist.&lt;/P&gt;
&lt;P&gt;a syslog event looks like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Feb&lt;/SPAN&gt; &lt;SPAN class=""&gt;7&lt;/SPAN&gt; &lt;SPAN class=""&gt;03:32:31&lt;/SPAN&gt; &lt;SPAN class=""&gt;Router&lt;/SPAN&gt; &lt;SPAN class=""&gt;kernel:&lt;/SPAN&gt; [&lt;SPAN class=""&gt;WAN_IN-3009-A&lt;/SPAN&gt;]&lt;SPAN class=""&gt;IN=eth0&lt;/SPAN&gt; &lt;SPAN class=""&gt;OUT=eth1.100&lt;/SPAN&gt; &lt;SPAN class=""&gt;MAC=18:e8:29:44:40:ac:00:1d:aa:a2:78:axxxxxx&lt;/SPAN&gt; &lt;SPAN class=""&gt;src=128.199.123.0&lt;/SPAN&gt; &lt;SPAN class=""&gt;DST=192.168.100.207&lt;/SPAN&gt; &lt;SPAN class=""&gt;LEN=60&lt;/SPAN&gt; &lt;SPAN class=""&gt;TOS=0x00&lt;/SPAN&gt; &lt;SPAN class=""&gt;PREC=0x00&lt;/SPAN&gt; &lt;SPAN class=""&gt;TTL=47&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID=52834&lt;/SPAN&gt; &lt;SPAN class=""&gt;DF&lt;/SPAN&gt; &lt;SPAN class=""&gt;PROTO=TCP&lt;/SPAN&gt; &lt;SPAN class=""&gt;SPT=38290&lt;/SPAN&gt; &lt;SPAN class=""&gt;DPT=8194&lt;/SPAN&gt; &lt;SPAN class=""&gt;WINDOW=29200&lt;/SPAN&gt; &lt;SPAN class=""&gt;RES=0x00&lt;/SPAN&gt; &lt;SPAN class=""&gt;SYN&lt;/SPAN&gt; &lt;SPAN class=""&gt;URGP=0&lt;/SPAN&gt; &lt;SPAN class=""&gt;MARK=0x64800000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;i already set up a lookup definition and lookup table, but i dont know exactly how to put up a search to display if a syslog even matches an IP in the blacklist.csv&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 16:15:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-lookup-for-syslogs/m-p/591428#M205891</guid>
      <dc:creator>splunkboob</dc:creator>
      <dc:date>2022-03-30T16:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: blacklist lookup for syslogs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-lookup-for-syslogs/m-p/591435#M205896</link>
      <description>&lt;P&gt;Assuming src and DST are already extracted and you don't already have a domain field extracted in your events, you could try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| lookup blacklist.csv IP as src
| lookup blacklist.csv IP as DST
| where isnotnull(domain)&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 30 Mar 2022 08:14:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-blacklist-lookup-for-syslogs/m-p/591435#M205896</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-30T08:14:26Z</dc:date>
    </item>
  </channel>
</rss>

