Splunk Enterprise Security

Splunk Enterprise Security: Look up file in correlation searches not populating

wgawhh5hbnht
Communicator

The following 3 Correlation Searches within ES have the error "lookup file is not populated":

  • Detect AWS Console Login by User from New Region
  • Detect AWS Console Login by User from New Country
  • Detect AWS Console Login by User from New City

The lookup file being referenced is "previously_seen_users_console_logins.csv "

When I look at the contents of the file, here is a redacted & trimmed down version of it:
identity,
arn:aws:sts:::assumed-role//

Why is splunk stating the lookup file is not populated? Is the syntax incorrect?
If there is any documentation on how to set the file up correctly, I would greatly appreciate some guidance on where it is located.

alt text

0 Karma

jawaharas
Motivator

You need to enable the scheduled report - 'ESCU - Previously seen users in CloudTrail' or run below query

sourcetype=aws:cloudtrail eventName=ConsoleLogin 
| rename userIdentity.arn as user 
| iplocation src 
| eval City=if(City LIKE "",src,City),Region=if(Region LIKE "",src,Region) 
| stats earliest(_time) as earliest latest(_time) as latest by user src City Region Country 
| outputlookup previously_seen_users_console_logins.csv 
| stats count
0 Karma

wgawhh5hbnht
Communicator

Enabled search, scheduled it, let it run, & still the 3 CS show "lookup file is not populated". If I manually run the search it returns results.

0 Karma

jawaharas
Motivator

Question-
1. Are you getting result if you run (manually) 'ESCU - Previously seen users in CloudTrail' report
2. If yes, are getting result when you run (manually) any of below reports

  • Detect AWS Console Login by User from New Region
  • Detect AWS Console Login by User from New Country
  • Detect AWS Console Login by User from New City

Also, where you notice the error 'lookup file is not populated'? Can you share screenshot?

0 Karma

wgawhh5hbnht
Communicator
  1. Yes
  2. All 3 searches, when ran manually, return NO RESULTS.

The error comes from configure > content management: en-US/app/SplunkEnterpriseSecuritySuite/ess_content_management?textFilter=Detect%20AWS%20Console%20Login%20by%20User%20
Unfortunately I can't upload another screenshot, as the attach picture only allows for a URL...

0 Karma

jawaharas
Motivator

Thanks for the details. Even I get the same error in 'Content Management' page. But, when I run below query ( of 'Detect AWS Console Login by User from New City' Correlation report) manually after removing the 'where' condition, I get results. Can you try and update here whether you get results?

| inputlookup previously_seen_users_console_logins.csv 
| stats min(earliest) as earliest max(latest) as latest by user City 
| join user type=outer 
    [| inputlookup previously_seen_users_console_logins.csv 
    | stats min(earliest) AS earliestseen by user 
    | fields earliestseen user] 
| eval userStatus=if(earliest >= relative_time(now(), "@d"), "New City","Previously Seen City") 
| eval UserData=if(earliestseen >= relative_time(now(), "@d") OR isnull(earliestseen), "New User","Old User") 
| convert ctime(earliest) ctime(latest) ctime(earliestseen) 
| table user City userStatus earliest latest earliestseen
0 Karma

wgawhh5hbnht
Communicator

I also get results when removing the where clause.

0 Karma

jawaharas
Motivator

Then, if you schedule the report, ideally it should work. Regarding the error - "lookup file is not populated", it's better to create a case in Splunk support.

0 Karma

wgawhh5hbnht
Communicator

I guess I'll be creating a case. The issue is we're using these lookups in Incident Response and we continue to receive alerts on users/cities/regions that we've whitelisted. My assumption is because Splunk believes the lookups are empty. I'm going to leave this open however in the meantime in case someone else has an answer or for when I get an update from Splunk about the issue, then I'll update this.

0 Karma

jawaharas
Motivator

@wgawhh5hbnht
Please accept the answer if it significantly helped resolve your query for the benefit of other forum members, who might run into a similar issue.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

🍂 Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...

Transform your security operations with Splunk Enterprise Security

Hi Splunk Community, Splunk Platform has set a great foundation for your security operations. With the ...

Splunk Admins and App Developers | Earn a $35 gift card!

Splunk, in collaboration with ESG (Enterprise Strategy Group) by TechTarget, is excited to announce a ...