Splunk Enterprise Security

Alert triggering on an entry not in inputlookup file

cnoulin
Explorer

Hello, i have made an alert as follow :

[|inputlookup admin_groups.csv | table "query" as Group_Name ] | search EventCode=4728

she work well but i have strange behavior.
Sometime she trigge with a Group_Name that is not in the list..
How explain that ?

Thanks in advance

0 Karma

cnoulin
Explorer

just a question.
with my alert i want to say :
if a group_name in my file in the "query" field correspond in group_name in my log it will fire
Is it ok ?
sorry for my english

0 Karma

lakshman239
Influencer

Assuming you have your logs in index=wineventlogs and if you want to alert based on the field value from your lookup [ I assume 'query' is a column in your lookup table], you could something like this

index=wineventlog [|inputlookup admin_groups.csv | field query | rename query AS Group_Name | format] | search EventCode=4728

This uses the sub-search from the lookup which provides values like (Group_Name=4624 OR Group_Name=4728) etc.. and if your lookup table has 4728, it will trigger an alert.

0 Karma

cnoulin
Explorer

4728 is my event_code , i thing you mean Group_Name=one_of_the_group_in_the_query_field ?

My real alert is
if a group_name in my file in the "query" field correspond in group_name in my log AND with EventCode=4728

My source log is WinEventLog:ForwardedEvents

0 Karma

lakshman239
Influencer

can you pls send a rows of the lookup table with field/column and sample search [ mask any sensitive data]?

0 Karma

cnoulin
Explorer

the file is as follow

query
...
DnsAdmins
DnsUpdateProxy
Domain Admins
Domain Admins Restriction
Domain Computers
Domain Controllers
COMPUTER1 Admins
...

thanks for your help

0 Karma

cnoulin
Explorer

and my index=windows

0 Karma

cnoulin
Explorer

thank you for your answer, i'll do the modification.
you think it could be the cause of the behavior ?

0 Karma

lakshman239
Influencer

If you have a field called 'query' in your lookup and want to change/rename as Group_Name, pls use the below

[|inputlookup admin_groups.csv | field query | rename query AS Group_Name ] | search EventCode=4728

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...