Splunk Enterprise Security

Excessive DNS Queries exclude by tag

jarkkokinnunen
New Member

Hi,

I tried to find out how to exclude tags from tstats search. My search is:
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

I want to make custom tag and exclude it from the search. Tag name could be "DNS" from src address.

I can exclude single ip address with this query but i would like to exclude src ip addressess what have tag "DNS"
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where DNS.src!=8.8.8.8 AND "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

How should I change the query?

I have already tried to exclude:
"tag::src"!=DNS
"tag::DNS.src"!=DNS

With no results.

0 Karma
Get Updates on the Splunk Community!

Get Inspired! We’ve Got Validation that Your Hard Work is Paying Off

We love our Splunk Community and want you to feel inspired by all your hard work! Eric Fusilero, our VP of ...

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...