I need to create a search to count the number of events in each geographic are of our network.
Each geo area will consist of multiple subnets.
Kentucky 10.10.10 10.10.11 10.10.12
Ohio 10.10.10.20 10.10.10.21
Indiana 10.10.30 10.10.31 10.10.32 10.10.10.33.
The report should simply output total by state:
Kentucky 112
Ohio 87
Indiana 212
All events have a full IP address but I've already used REX to assign the first 3 octets to the field SUBNET.
Thanks
You could use a lookup table.
Define a lookup file ("subnets.csv") with two columns: subnet and state. Refer to the lookup file in your query.
<your current search> | lookup subnets.csv subnet OUTPUT state | stats count by state
I answered a very similar question not too long ago.
Take a look here: https://answers.splunk.com/answers/801332/how-do-you-match-ip-address-with-ips-with-cidr-not.html#an...
You don't need to do any fancy regex to extract parts of the IP address. Make Splunk do the work with your lookup! 🙂
Hope that helps!
rmmiller
You could use a lookup table.
Define a lookup file ("subnets.csv") with two columns: subnet and state. Refer to the lookup file in your query.
<your current search> | lookup subnets.csv subnet OUTPUT state | stats count by state
So the lookup would contain 2 columns, subnet and state and nothing else correct?
Yes, for your application, you need to have 2 columns: subnet and state.
Sorry, typo,
Ohio should be 10.10.20 and 10.10.21
you can edit your question 🙂