Splunk Enterprise

Query events matched a value in lookup csv (regex)

lnn2204
Path Finder

Hi, I had this csv list

command_Rexcomment_remark
*uname -amalicious
*arp*malicious
*tcpdump*malicious

 

I want to search for events (it had data.command field that hold the command executed in linux server)

How can I search and filter out those event matched 1 of those regex in the list?

0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

If you have that CSV file, then you should create a lookup DEFINITION that is using that CSV - then make the advanced option 

WILDCARD(command_Rex)

and then in your SPL

| lookup definition_name command_Rex as data.command OUTPUT comment_remark

This assumes that your event field 'data.command' that contains a string that is to be matched against the command_Rex, which contains wildcards - so this will do a wildcard match - NOT a regex.

 

View solution in original post

bowesmana
SplunkTrust
SplunkTrust

If you have that CSV file, then you should create a lookup DEFINITION that is using that CSV - then make the advanced option 

WILDCARD(command_Rex)

and then in your SPL

| lookup definition_name command_Rex as data.command OUTPUT comment_remark

This assumes that your event field 'data.command' that contains a string that is to be matched against the command_Rex, which contains wildcards - so this will do a wildcard match - NOT a regex.

 

lnn2204
Path Finder

in my csv file, I have this to check

*\.shtest

 

tried your suggestion, but I the comment_remark wasn't added to the events, I had a lot of events run .sh file

lnn2204_0-1692262056786.png

 

0 Karma

lnn2204
Path Finder

I understood why it happened. Thank you a lot

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...