Splunk Enterprise Security

Excessive DNS Queries exclude by tag

jarkkokinnunen
New Member

Hi,

I tried to find out how to exclude tags from tstats search. My search is:
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

I want to make custom tag and exclude it from the search. Tag name could be "DNS" from src address.

I can exclude single ip address with this query but i would like to exclude src ip addressess what have tag "DNS"
| tstats summariesonly=true allow_old_summaries=true count from datamodel="Network_Resolution"."DNS" where DNS.src!=8.8.8.8 AND "DNS.message_type"="QUERY" by "DNS.src" | rename "DNS.src" as "src" | where 'count'>100

How should I change the query?

I have already tried to exclude:
"tag::src"!=DNS
"tag::DNS.src"!=DNS

With no results.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...