Splunk Search

Adding lookup files for tuning purposes

Robbie1194
Communicator

So I'm new to Splunk (and ES) and have been asked to tune out some noise as we are getting a lot of false positives from one of the rules: Access - Excessive Failed Logins - Rule.

Could anyone help me with how I add the lookup file in my search so that it reads user and dest values stored inside?

| from datamodel:"Authentication"."Failed_Authentication" | stats values(tag) as "tag",dc(user) as "user_count",dc(dest) as "dest_count",count by "app","src" | where 'count'>=6

My aim is to build a list with destinations and users that are not included within the rule.

Any help (and explanation) would be much appreciated.

Tags (1)
0 Karma
1 Solution

DalJeanis
Legend

The big picture is this: any record that gets to the end of the search generates an alert, so any workable method to eliminate the records that you do NOT want an alert from is a valid method.

Look at the answer on this one for one example of how to input, use and update a list of field combinations to suppress the alert on...

https://answers.splunk.com/answers/548711/how-to-throttle-an-alert-using-more-than-one-field.html#an...

For a more general case, here's one way to suppress records based on a lookup or csv...

https://answers.splunk.com/answers/305030/how-to-use-a-lookup-file-to-suppress-alerts.html

This one includes Somesoni2's code to look for an alert that was fired earlier...

https://answers.splunk.com/answers/403320/how-do-i-suppress-alerts-until-the-next-day-at-12.html

View solution in original post

0 Karma

DalJeanis
Legend

The big picture is this: any record that gets to the end of the search generates an alert, so any workable method to eliminate the records that you do NOT want an alert from is a valid method.

Look at the answer on this one for one example of how to input, use and update a list of field combinations to suppress the alert on...

https://answers.splunk.com/answers/548711/how-to-throttle-an-alert-using-more-than-one-field.html#an...

For a more general case, here's one way to suppress records based on a lookup or csv...

https://answers.splunk.com/answers/305030/how-to-use-a-lookup-file-to-suppress-alerts.html

This one includes Somesoni2's code to look for an alert that was fired earlier...

https://answers.splunk.com/answers/403320/how-do-i-suppress-alerts-until-the-next-day-at-12.html

0 Karma

Robbie1194
Communicator

Thanks a lot, the URL's were very helpful.

DalJeanis
Legend

moved the comment under the answer it related to. You're welcome!

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...