<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310278#M93070</link>
    <description>&lt;P&gt;Tried with the below query and showing some error:  "Error in 'join' command: Usage: join  ()? [subsearch]"&lt;/P&gt;

&lt;P&gt;|inputlookup Blackipfortinet.csv | join dstip type=outer | search [ search index=fortinet | stats   count(dstip) as countip  by dstip] | table dstip&lt;/P&gt;

&lt;P&gt;Need help&lt;/P&gt;</description>
    <pubDate>Tue, 04 Apr 2017 19:17:27 GMT</pubDate>
    <dc:creator>renjujacob88</dc:creator>
    <dc:date>2017-04-04T19:17:27Z</dc:date>
    <item>
      <title>Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310270#M93062</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have a blacklisted inputlookup csv which contains 20000 blacklisted ip. I need to compare the inputlookup with the fortinet firewall and display the count of the destination IP along with the srcip&lt;/P&gt;

&lt;P&gt;As of now i'm having a query which will compare the firewall outbound traffic and display any blacklisted ip which is present in the inputlookup.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;| inputlookup Blackipfortinet.csv | search [ search index=fortinet  | dedup dstip | fields dstip ]&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;What i need is the count of the destination ip followed by the src ip and time? is it possible&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 18:37:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310270#M93062</guid>
      <dc:creator>renjujacob88</dc:creator>
      <dc:date>2017-04-04T18:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310271#M93063</link>
      <description>&lt;P&gt;| stats count values(src_ip) as src_ip values(_time) as _time by dstip&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:27:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310271#M93063</guid>
      <dc:creator>bshuler_splunk</dc:creator>
      <dc:date>2020-09-29T13:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310272#M93064</link>
      <description>&lt;P&gt;Thanks for the reply. But iam not getting any results from the query.&lt;BR /&gt;
| inputlookup Blackipfortinet.csv  | search [ search index=fortinet |  stats count values(srcip) as src_ip values(_time) as _time by dstip ]&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:32:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310272#M93064</guid>
      <dc:creator>renjujacob88</dc:creator>
      <dc:date>2020-09-29T13:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310273#M93065</link>
      <description>&lt;P&gt;| inputlookup Blackipfortinet.csv | search [   search index=fortinet | dedup dstip | fields dstip] | stats count values(srcip) as src_ip values(_time) as _time by dstip&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:32:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310273#M93065</guid>
      <dc:creator>bshuler_splunk</dc:creator>
      <dc:date>2020-09-29T13:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310274#M93066</link>
      <description>&lt;P&gt;try this&lt;/P&gt;

&lt;P&gt;| inputlookup Blackipfortinet.csv | join distip type=outer | search [ search index=fortinet | stats count(distip) as distip_count by srcip] | table srcip, distip_count&lt;/P&gt;

&lt;P&gt;if not want the filed names of Blackipfortinet.csv as well. required matching filed from csv file, and same to be fortinet index to compare, based on you can get statistical data like count (distip) based on srcip.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:32:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310274#M93066</guid>
      <dc:creator>vgunti</dc:creator>
      <dc:date>2020-09-29T13:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310275#M93067</link>
      <description>&lt;P&gt;Depending on the number of logs in the subsearch, you may hit your head on a limit there.&lt;/P&gt;

&lt;P&gt;You could use a straight lookup as well to get the matches like this:&lt;/P&gt;

&lt;P&gt;index=fortinet | dedup dstip | lookup Blackipfortinet.csv ipfieldname AS dstip |search dstip=*  &lt;/P&gt;

&lt;P&gt;and then use the stats command as mentioned above.  Keep in mind with the stats on time if you have a number of values, you could end up with a stack of timestamps to wade through, so perhaps getting an idea on connections and number of connections first might be desired and then drill into specifics from there, but that would depend on what you are trying to accomplish.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 19:03:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310275#M93067</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2017-04-04T19:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310276#M93068</link>
      <description>&lt;P&gt;@bshuler thanks the query is working but needs some tuning. As iam using dedup dstip . the count is giving one one. Can u recomend the same without the dedup. so that i can get the exact count&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 19:05:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310276#M93068</guid>
      <dc:creator>renjujacob88</dc:creator>
      <dc:date>2017-04-04T19:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310277#M93069</link>
      <description>&lt;P&gt;This should give you all the records from firewall outbound traffic logs which are going to blacklisted IPs&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fortinet [| inputlookup Blackipfortinet.csv | table dstip]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Assuming above index includes srcip (check the field names), time (_time actually) and dstip, so you can generate the report/aggregation you want. For example &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fortinet [| inputlookup Blackipfortinet.csv | table dstip]
| stats dc(dstip) as "DestIP count" min(_time) as "First Occurred" max(_time) as "Last Occurred" by srcip
| convert ctime(*Occurred) 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 04 Apr 2017 19:08:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310277#M93069</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-04-04T19:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310278#M93070</link>
      <description>&lt;P&gt;Tried with the below query and showing some error:  "Error in 'join' command: Usage: join  ()? [subsearch]"&lt;/P&gt;

&lt;P&gt;|inputlookup Blackipfortinet.csv | join dstip type=outer | search [ search index=fortinet | stats   count(dstip) as countip  by dstip] | table dstip&lt;/P&gt;

&lt;P&gt;Need help&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 19:17:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310278#M93070</guid>
      <dc:creator>renjujacob88</dc:creator>
      <dc:date>2017-04-04T19:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310279#M93071</link>
      <description>&lt;P&gt;Assuming that your &lt;CODE&gt;fortinet&lt;/CODE&gt; data is &lt;CODE&gt;CIM&lt;/CODE&gt;-compliant and uses &lt;CODE&gt;src_ip&lt;/CODE&gt; and &lt;CODE&gt;dest_ip&lt;/CODE&gt;and also assuming that your lookup has a field &lt;CODE&gt;dstip&lt;/CODE&gt;, then like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fortinet | lookup dstip AS dest_ip Blackipfortinet output dstip AS blacklist
| search blacklist="*"
| stats dc(src_ip) values(src_ip) min(_time) as "First Occurred" max(_time) as "Last Occurred" by dest_ip
| convert ctime(*Occurred) 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 04 Apr 2017 19:19:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310279#M93071</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-04-04T19:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing the firewall ip to the inputlook which contains the blacklisted ip and need to display the count and source</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310280#M93072</link>
      <description>&lt;P&gt;Thanks somesoni2. Query is working smooth&lt;/P&gt;

&lt;P&gt;index=fortinet [| inputlookup Blackipfortinet.csv | table dstip] dstip!="10.11.1.251"   | stats  values(srcip) as "Source IP" min(_time) as "First Occurred" max(_time) as "Last Occurred" count(dstip) as destcount by dstip | convert ctime("First Occurred"), ctime("Last Occurred")&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:32:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-the-firewall-ip-to-the-inputlook-which-contains-the/m-p/310280#M93072</guid>
      <dc:creator>renjujacob88</dc:creator>
      <dc:date>2020-09-29T13:32:17Z</dc:date>
    </item>
  </channel>
</rss>

