Splunk Enterprise Security

searching and alerting on ip_intel

hbfblueteam
New Member

Hi,

Does anyone know if there is an efficient way to incorporate ip_intel into a search/query. I want to set up an alert using a particular ip_intel feed for a specific index to notify me when there is traffic from high-risk IP addresses.

Currently trying the below but I get no results (saw the below as another answer but cannot get it to work)

index=reverse_proxy [|inputlookup ip_intel | return ip] | where ip=src

note: "src" is the the field name in which the IP is parsed for my index

Cheers

Labels (1)
0 Karma
1 Solution

harsmarvania57
Ultra Champion

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)

View solution in original post

0 Karma

harsmarvania57
Ultra Champion

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)
0 Karma

hbfblueteam
New Member

Thank you, that has given me some results

Regards,
Marko

0 Karma

to4kawa
Ultra Champion

https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Return

<count>
Syntax: <int>
Description: Specify the number of rows.
Default: 1, which is the first row of results passed into the command.

see reference.

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...