Splunk Enterprise Security

Excessive DNS Queries exclude by tag

jarkkokinnunen
New Member

Hi,

I tried to find out how to exclude tags from tstats search. My search is:
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

I want to make custom tag and exclude it from the search. Tag name could be "DNS" from src address.

I can exclude single ip address with this query but i would like to exclude src ip addressess what have tag "DNS"
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where DNS.src!=8.8.8.8 AND "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

How should I change the query?

I have already tried to exclude:
"tag::src"!=DNS
"tag::DNS.src"!=DNS

With no results.

0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco + Splunk! We’ve ...