Hi,
I have a firewall log in which some of the destinations do not have SNI, but I have their IPs.
I want to create/extract a new field from destination to get the destination details, for example the Resolve Host or the Organization.
Can someone please advise if this is possible and how?
Thank you in advance.
Basically there are two way to do it.
https://community.splunk.com/t5/Splunk-Search/DNS-Lookup-via-Splunk/td-p/72304
1st one needs that you are keeping up separate ip vs nsi mappings in csv file or in kvstore and update it regular base.
2nd one needs separate command to do it and if/when you have lot of IPs it could take a long time. You can start with this https://splunkbase.splunk.com/app/1535/
r. Ismo
Hello ,
search is like:
index=FW
|stats count by Src,Dst,sni
results are like:
192.168.1.12 2.23.259.24 assets.msn.com
192.168.1.20 3.68.77.130
in the second row, the sni is empty. using a workflow, I can get the info of this IP (Amazon Technologies) but I have 2 issues:
1- I just need to get back single field (for example: Organization)
2- I want to be able to have this field (result of the workflow OR kind of External web lookup!) available in my reports and search results, like an extracted field.
Thank you in advance for your kind support.
Basically there are two way to do it.
https://community.splunk.com/t5/Splunk-Search/DNS-Lookup-via-Splunk/td-p/72304
1st one needs that you are keeping up separate ip vs nsi mappings in csv file or in kvstore and update it regular base.
2nd one needs separate command to do it and if/when you have lot of IPs it could take a long time. You can start with this https://splunkbase.splunk.com/app/1535/
r. Ismo
Thank you sir!