Splunk Enterprise Security

Alert triggering on an entry not in inputlookup file

cnoulin
Explorer

Hello, i have made an alert as follow :

[|inputlookup admin_groups.csv | table "query" as Group_Name ] | search EventCode=4728

she work well but i have strange behavior.
Sometime she trigge with a Group_Name that is not in the list..
How explain that ?

Thanks in advance

0 Karma

cnoulin
Explorer

just a question.
with my alert i want to say :
if a group_name in my file in the "query" field correspond in group_name in my log it will fire
Is it ok ?
sorry for my english

0 Karma

lakshman239
Influencer

Assuming you have your logs in index=wineventlogs and if you want to alert based on the field value from your lookup [ I assume 'query' is a column in your lookup table], you could something like this

index=wineventlog [|inputlookup admin_groups.csv | field query | rename query AS Group_Name | format] | search EventCode=4728

This uses the sub-search from the lookup which provides values like (Group_Name=4624 OR Group_Name=4728) etc.. and if your lookup table has 4728, it will trigger an alert.

0 Karma

cnoulin
Explorer

4728 is my event_code , i thing you mean Group_Name=one_of_the_group_in_the_query_field ?

My real alert is
if a group_name in my file in the "query" field correspond in group_name in my log AND with EventCode=4728

My source log is WinEventLog:ForwardedEvents

0 Karma

lakshman239
Influencer

can you pls send a rows of the lookup table with field/column and sample search [ mask any sensitive data]?

0 Karma

cnoulin
Explorer

the file is as follow

query
...
DnsAdmins
DnsUpdateProxy
Domain Admins
Domain Admins Restriction
Domain Computers
Domain Controllers
COMPUTER1 Admins
...

thanks for your help

0 Karma

cnoulin
Explorer

and my index=windows

0 Karma

cnoulin
Explorer

thank you for your answer, i'll do the modification.
you think it could be the cause of the behavior ?

0 Karma

lakshman239
Influencer

If you have a field called 'query' in your lookup and want to change/rename as Group_Name, pls use the below

[|inputlookup admin_groups.csv | field query | rename query AS Group_Name ] | search EventCode=4728

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...