Splunk Cloud Platform

Anyone used the IP Quality Score Add-On?

jhilton90
Path Finder

Does anyone have any experience using the IP Quality Score add-on in Splunk? I've been given very little information on how to actually run searches in the add-on and so far im not getting any results.

For instance I'm trying to use the IP Detection commands on our web traffic logs but I'm not getting any results. I just keep getting an error saying:

 

Exception at "/opt/splunk/etc/apps/TA-ipqualityscore/bin/ipdetection.py", line 127 : There are no events with ip field.

 

 

Labels (1)
Tags (2)

IPQualityScore
Engager

Hi All - A new version of the IPQS Splunk plugin is now available, which fixes the past issues.

https://splunkbase.splunk.com/app/5423

Please let us know if you encounter any new errors, we'll be happy to investigate.

You can also message support@ipqualityscore.com.

keenerms
Engager

Did you ever find a solution to this?  We're having the same problem two years later.

I just sat down with the IPQS team and demonstrated the issue.  They took the same data set and it ran flawlessly in their environment, so it's not the content of the field.  We're currently trying to determine if our Splunk config is different than theirs and somehow causing this issue.

0 Karma

jhilton90
Path Finder

So we did manage to get this working with help from the guy who built the addon. I'll give you an example of a Splunk query that helped me

index="example" #This is our authentication index
| table username
| eval username_email=if(match(username,"[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,}"),username,null())
| where isnotnull (username_email)
| table username_email
| emailvalidation field="username_email"
0 Karma

IPQualityScore
Engager
Hi Everyone -  The error below indicates that the field containing the IP address does not exists in the events. The custom command is looking for a field supplied via "field" attribute to the "ipdetection" command. Please make sure you have the correct "field" value specified.
 
For example:

 

... | ipdetection field=ip // sample usage when ip field contains IP address value
... | rex field=_raw "(?<ip_address>d{1,3}.d{1,3}.d{1,3}.d{1,3})" | ipdetection field=ip_address // sample usage when you need to extract IP address from raw event

 

Additional command options can be found in the documentation https://ta-ipqualityscore.readthedocs.io/en/latest/ipdetection.html
 
Please feel free to reach out if you experience any issues: support@ipqualityscore.com
0 Karma

jviray
Explorer

Even using a field that has defined IP values doesn't work and returned the following error:

"Streamed search execute failed because: Error in 'ipdetection' command: External search command exited unexpectedly with non-zero error code 1.."

This works but you can't pass values to it within a query:

| ipqualityscore field="IP Address" value="8.8.8.8"

0 Karma

bcsfullsail
Engager

Did you figure anything out with that error?  We have the same issue.

0 Karma

jhilton90
Path Finder

What data are you working with?

Tags (1)
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...