Splunk Enterprise Security

searching and alerting on ip_intel

hbfblueteam
New Member

Hi,

Does anyone know if there is an efficient way to incorporate ip_intel into a search/query. I want to set up an alert using a particular ip_intel feed for a specific index to notify me when there is traffic from high-risk IP addresses.

Currently trying the below but I get no results (saw the below as another answer but cannot get it to work)

index=reverse_proxy [|inputlookup ip_intel | return ip] | where ip=src

note: "src" is the the field name in which the IP is parsed for my index

Cheers

Labels (1)
0 Karma
1 Solution

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)

View solution in original post

0 Karma

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)
0 Karma

hbfblueteam
New Member

Thank you, that has given me some results

Regards,
Marko

0 Karma

to4kawa
Ultra Champion

https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Return

<count>
Syntax: <int>
Description: Specify the number of rows.
Default: 1, which is the first row of results passed into the command.

see reference.

0 Karma
Get Updates on the Splunk Community!

Streamline Data Ingestion With Deployment Server Essentials

REGISTER NOW!Every day the list of sources Admins are responsible for gets bigger and bigger, often making the ...

Remediate Threats Faster and Simplify Investigations With Splunk Enterprise Security ...

REGISTER NOW!Join us for a Tech Talk around our latest release of Splunk Enterprise Security 7.2! We’ll walk ...

Introduction to Splunk AI

WATCH NOWHow are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. ...