Splunk Search

How do I edit my search to compare a list of IPs from a lookup to IPs in firewall logs?

Explorer

I'm still new to Splunk and trying to figure out the correct syntax for lookups.

My goal is to compare a list of known IPs associated with a botnet and see if there is any traffic to/from the IPs in the firewall logs.

index=firewall_logs sourcetype=cisco:asa [ | inputlookup bad_ips.csv | fields IP ]

This returns nothing. What else am I missing? Thanks in advance!

0 Karma
1 Solution

SplunkTrust
SplunkTrust

Hi CYBR_AH,

run the search using return instead fields :

index=firewall_logs sourcetype=cisco:asa | [ | inputlookup bad_ips.csv | return 999 IP ]

This will return the results from the lookup file as this string:

(IP="1.1.1.1") OR (IP="2.2.2.2") ....

which will be used in the base search, so the search be in the end:

index=firewall_logs sourcetype=cisco:asa (IP="1.1.1.1") OR (IP="2.2.2.2") ....

Read the docs on return to learn more details http://docs.splunk.com/Documentation/Splunk/6.3.0/SearchReference/Return

Hope this helps ...

cheers, MuS

Update:

Sorry the first one was wrong! Try this instead:

 | inputlookup bad_ips.csv | search [ search index=firewall_logs sourcetype=cisco:asa | dedup IP | fields IP ]

Hope this makes more sense ...

View solution in original post

0 Karma

New Member

where do ve upload .csv file in splunk which contains list of IPs?

0 Karma

SplunkTrust
SplunkTrust

Hi CYBR_AH,

run the search using return instead fields :

index=firewall_logs sourcetype=cisco:asa | [ | inputlookup bad_ips.csv | return 999 IP ]

This will return the results from the lookup file as this string:

(IP="1.1.1.1") OR (IP="2.2.2.2") ....

which will be used in the base search, so the search be in the end:

index=firewall_logs sourcetype=cisco:asa (IP="1.1.1.1") OR (IP="2.2.2.2") ....

Read the docs on return to learn more details http://docs.splunk.com/Documentation/Splunk/6.3.0/SearchReference/Return

Hope this helps ...

cheers, MuS

Update:

Sorry the first one was wrong! Try this instead:

 | inputlookup bad_ips.csv | search [ search index=firewall_logs sourcetype=cisco:asa | dedup IP | fields IP ]

Hope this makes more sense ...

View solution in original post

0 Karma

SplunkTrust
SplunkTrust

update ping...

0 Karma

Explorer

I tried

index=firewall_logs sourcetype=cisco:asa | [ | inputlookup bad_ips.csv | return 999 $IP] | stats count by dest_ip

and it worked. This gave me a really good starting point. Thanks for your help! 🙂

0 Karma