All Apps and Add-ons

Lookup File Lookup in props\transform

Path Finder

We are using graylog to forward windows security events to SPLUNK, since we are using Enterprise Security and COM and we worked with SPLUNK PS to basically remap the fields from winlogbeat_ to format needed by the SPLUNK_TA_windows app. We have these working but are struggling with 1 lookup.

The field is 'action' with a value of "Action Success" or "Action Failure". However, when graylog sends it as [Action Success] or [Action Failure]. We changed the lookups file from splunk_ta_windows to [Action Success], success or [Action Failure],failure.

It doesn't appear to pull this from the lookup table. Is there a particular format when prefaced with a special character?

Here is what I tried:

[audit failure],failure
[Audit Failure],failure


Not sure if this is conflicting with the TA_Windows lookup or not, when I look at a btool I see that mine loaded, but I would think if I was using that one it would have broken the events coming in over the SPLUNK UF.

Tags (1)
0 Karma

Ultra Champion

Can you not update your extractions to strip off those square brackets before the lookup is applied?

0 Karma

Path Finder

Thanks Frank, I did try that but was not successful. What my issue was the Splunk_TA_windows lookup was taking precedence so I just called it another name it works.

0 Karma
Get Updates on the Splunk Community!

Build Scalable Security While Moving to Cloud - Guide From Clayton Homes

 Clayton Homes faced the increased challenge of strengthening their security posture as they went through ...

Mission Control | Explore the latest release of Splunk Mission Control (2.3)

We’re happy to announce the release of Mission Control 2.3 which includes several new and exciting features ...

Cloud Platform | Migrating your Splunk Cloud deployment to Python 3.7

Python 2.7, the last release of Python 2, reached End of Life back on January 1, 2020. As part of our larger ...