Splunk Enterprise Security

Alert triggering on an entry not in inputlookup file

cnoulin
Explorer

Hello, i have made an alert as follow :

[|inputlookup admin_groups.csv | table "query" as Group_Name ] | search EventCode=4728

she work well but i have strange behavior.
Sometime she trigge with a Group_Name that is not in the list..
How explain that ?

Thanks in advance

0 Karma

cnoulin
Explorer

just a question.
with my alert i want to say :
if a group_name in my file in the "query" field correspond in group_name in my log it will fire
Is it ok ?
sorry for my english

0 Karma

lakshman239
Influencer

Assuming you have your logs in index=wineventlogs and if you want to alert based on the field value from your lookup [ I assume 'query' is a column in your lookup table], you could something like this

index=wineventlog [|inputlookup admin_groups.csv | field query | rename query AS Group_Name | format] | search EventCode=4728

This uses the sub-search from the lookup which provides values like (Group_Name=4624 OR Group_Name=4728) etc.. and if your lookup table has 4728, it will trigger an alert.

0 Karma

cnoulin
Explorer

4728 is my event_code , i thing you mean Group_Name=one_of_the_group_in_the_query_field ?

My real alert is
if a group_name in my file in the "query" field correspond in group_name in my log AND with EventCode=4728

My source log is WinEventLog:ForwardedEvents

0 Karma

lakshman239
Influencer

can you pls send a rows of the lookup table with field/column and sample search [ mask any sensitive data]?

0 Karma

cnoulin
Explorer

the file is as follow

query
...
DnsAdmins
DnsUpdateProxy
Domain Admins
Domain Admins Restriction
Domain Computers
Domain Controllers
COMPUTER1 Admins
...

thanks for your help

0 Karma

cnoulin
Explorer

and my index=windows

0 Karma

cnoulin
Explorer

thank you for your answer, i'll do the modification.
you think it could be the cause of the behavior ?

0 Karma

lakshman239
Influencer

If you have a field called 'query' in your lookup and want to change/rename as Group_Name, pls use the below

[|inputlookup admin_groups.csv | field query | rename query AS Group_Name ] | search EventCode=4728

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...