<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I extract certain fields into a KV Store and then perform checks against that KV Store in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650294#M224802</link>
    <description>&lt;P&gt;After you've created the KV Store collection, it can be used like any other lookup.&amp;nbsp; Use the &lt;FONT face="courier new,courier"&gt;outputlookup&lt;/FONT&gt; command to write to it and the &lt;FONT face="courier new,courier"&gt;lookup&lt;/FONT&gt; or &lt;FONT face="courier new,courier"&gt;inputlookup&lt;/FONT&gt; command to fetch from it.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jul 2023 20:27:45 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2023-07-12T20:27:45Z</dc:date>
    <item>
      <title>How do I extract certain fields into a KV Store and then perform checks against that KV Store</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650188#M224786</link>
      <description>&lt;P&gt;So I'm ingesting advanced hunting logs into Splunk and one of the interesting fields is&amp;nbsp;&lt;EM&gt;properties.InitiatingProcessSHA1&lt;/EM&gt;, which is a hash of whatever file (properties.InitiatingProcessVersionInfoOriginalFileName) is being run on the end user's machine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to be able to extract the SHA1 value and FileName value into a KV Store and then be able to make queries against that KV store.&lt;/P&gt;&lt;P&gt;For example, say there is a SHA1 hash for a file called text_program.exe, which has appeared in the logs:&lt;/P&gt;&lt;P&gt;SHA1: 111111111111&lt;/P&gt;&lt;P&gt;FileName: test_program.exe&lt;/P&gt;&lt;P&gt;I'd like to be able to extract the hash value as well as the file name into a KV Store, and make queries against the KV store. Because in the event that someone clicks on a phishing email and accidently downloads a program called text_program.exe and it has a hash value of 22222222222, I can investigate this.&lt;/P&gt;&lt;P&gt;I'm just wondering what the best way to tackle this would be&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 13:46:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650188#M224786</guid>
      <dc:creator>jhilton90</dc:creator>
      <dc:date>2023-07-12T13:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do I extract certain fields into a KV Store and then perform checks against that KV Store</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650294#M224802</link>
      <description>&lt;P&gt;After you've created the KV Store collection, it can be used like any other lookup.&amp;nbsp; Use the &lt;FONT face="courier new,courier"&gt;outputlookup&lt;/FONT&gt; command to write to it and the &lt;FONT face="courier new,courier"&gt;lookup&lt;/FONT&gt; or &lt;FONT face="courier new,courier"&gt;inputlookup&lt;/FONT&gt; command to fetch from it.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 20:27:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650294#M224802</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-07-12T20:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: How do I extract certain fields into a KV Store and then perform checks against that KV Store</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650340#M224816</link>
      <description>&lt;P&gt;Ideally I don't want to manually add field values to the kv store, I'd like the field values to be automatically added if they are not already in the KV Store.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 08:22:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650340#M224816</guid>
      <dc:creator>jhilton90</dc:creator>
      <dc:date>2023-07-13T08:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do I extract certain fields into a KV Store and then perform checks against that KV Store</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650400#M224848</link>
      <description>&lt;P&gt;In that case, you may have to use a normal lookup table rather than a KVStore collection.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 15:08:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-extract-certain-fields-into-a-KV-Store-and-then-perform/m-p/650400#M224848</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-07-13T15:08:52Z</dc:date>
    </item>
  </channel>
</rss>

