Getting Data In

Compare list of used credentials in events with list of total credentials in lookup

parkz
Explorer

I have a lookup of all active credentials from tenable called tio_credentials.csv. I have a search that lists unique credentials used, like so:

`tenable` `io` earliest=-15d pluginID=19506
| rex field=plugin_output "'(?<domain>.*\\\)?(?P<Credentialed_Checks>.*)'"
| stats dc(host-ip) as count by Credentialed_Checks

 

How do I compare the list of credentials from Splunk events with the lookup in a way that shows all the credentials in the lookup that aren't showing up in events? I'm new to splunk and trying to see if there's any credentials we can remove from our credentials list.

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Depending on what your credentials field is in your csv

`tenable` `io` earliest=-15d pluginID=19506
| rex field=plugin_output "'(?<domain>.*\\\)?(?P<Credentialed_Checks>.*)'"
| stats dc(host-ip) as count by Credentialed_Checks
| append
  [| inputlookup tio_credentials.csv
   | rename credential as Credentialed_Checks
   | eval csv="True"
   | fields csv Credentialed_Checks]
| stats count values(csv) as csv by Credentialed_Checks
| where count = 1 AND csv="True"

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

The general method is to read the lookup file using a where clause that excludes credentials that are indexed.  The SPL looks something like this:

| inputlookup tio_credentials.csv where NOT [ search `tenable` `io` earliest=-15d pluginID=19506
  | rex field=plugin_output "'(?<domain>.*\\\)?(?P<Credentialed_Checks>.*)'"
  | stats dc(host-ip) as count by Credentialed_Checks
  | rename Credentialed_Checks as <<equivalent field name in the lookup>>
  | fields - count
  | format ]

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Depending on what your credentials field is in your csv

`tenable` `io` earliest=-15d pluginID=19506
| rex field=plugin_output "'(?<domain>.*\\\)?(?P<Credentialed_Checks>.*)'"
| stats dc(host-ip) as count by Credentialed_Checks
| append
  [| inputlookup tio_credentials.csv
   | rename credential as Credentialed_Checks
   | eval csv="True"
   | fields csv Credentialed_Checks]
| stats count values(csv) as csv by Credentialed_Checks
| where count = 1 AND csv="True"
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...