Monitoring Splunk

Best approach to remove false positives (email) from search when it contains 'error'

Esky73
Builder

i have a search looking for "error" OR "fail" OR "failed" OR "exception" in events

However we are picking up false positives where there is an email in a field such as:

mr.error@hotmail.com

Also the position of the email is in different places within the field.

How best to exclude ?

sample fields:

msg:     LogCorrelationId XXXXXXXXXX. Email mr.error@hotmail.com. Info: Authentication MyAccountRegistrationStarted

msg:     2019-04-01T00:48:48.828Z facebook|XXXXX::Rules::EagerLinking:: searching for other users with email: [ 'mr.error@hotmail.com', 'mr.error@hotmail.com' ]    

msg:     2019-04-01T00:48:42.535Z ::identify-user-otp:: IsOTP: [{"name":"Mr X","email":"mr.error@hotmail.com","given_name":
Tags (1)
0 Karma

HiroshiSatoh
Champion

Since "NOT" will slow down the search, I think that it is good to extract and filter once.

(your search) "error" OR "fail" OR "failed" OR "exception" |search NOT ("*error@*.*" OR "error*@*.*")
0 Karma

Esky73
Builder

Thanks Hiroshi - this looks ok for error - but trying to future-proof there may potentially be emails that also have the other keywords in also.

0 Karma

HiroshiSatoh
Champion

I think that the condition(contains ) should be a lookup file.

 |search NOT [|inputlookup your_lookup.csv|table contains |rename contains as query]
0 Karma

Esky73
Builder

hi Hiroshi - are you suggesting we have a lookup with all emails in ? i don't think thats possible to get a list of all potentially tens of thousands of emails ?

0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...