Splunk Enterprise Security

searching and alerting on ip_intel

hbfblueteam
New Member

Hi,

Does anyone know if there is an efficient way to incorporate ip_intel into a search/query. I want to set up an alert using a particular ip_intel feed for a specific index to notify me when there is traffic from high-risk IP addresses.

Currently trying the below but I get no results (saw the below as another answer but cannot get it to work)

index=reverse_proxy [|inputlookup ip_intel | return ip] | where ip=src

note: "src" is the the field name in which the IP is parsed for my index

Cheers

Labels (1)
0 Karma
1 Solution

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)

View solution in original post

0 Karma

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)
0 Karma

hbfblueteam
New Member

Thank you, that has given me some results

Regards,
Marko

0 Karma

to4kawa
Ultra Champion

https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Return

<count>
Syntax: <int>
Description: Specify the number of rows.
Default: 1, which is the first row of results passed into the command.

see reference.

0 Karma
Get Updates on the Splunk Community!

Index This | How many sides does a circle have?

February 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Registration for Splunk University is Now Open!

Are you ready for an adventure in learning?   Brace yourselves because Splunk University is back, and it's ...

Splunkbase | Splunk Dashboard Examples App for SimpleXML End of Life

The Splunk Dashboard Examples App for SimpleXML will reach end of support on Dec 19, 2024, after which no new ...