Splunk Search

How to not Display Data that is less than 10 days old?

IndyJones1345
Loves-to-Learn

Hello all,

I know this has been asked many different ways but, I cant seem to get the search correct. 

I am attempting to "Don't Display Data that is less than 10 days old. I have to set-up a whitelist via a look table, the idea here is we add IP's or URL that show no threat, so want to stop seeing alerts coming in. But - we want to recheck the data again in 10 days.

This is my test search, But it still shows IP or URL's in the lookup table.

 

 

 

| from datamodel:"Threat_Intelligence"."Threat_Activity" 
| search NOT [| inputlookup my_whitelist.csv | fields threat_match_value] 
| where lastSeen>=relative_time(now(),"-10d") AND _time<=now()
| table _time threat_match_value

 

 

 

My look table fields are 

uc.png

Labels (2)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What fields are returned by your initial search?

The search NOT line will expand to a set of equalities such as 'threat_match_value = "xyz"' OR 'threat_match_value = "abc"', so unless you have a find in your initial search called threat_match_value, this line is unlikely to perform as you might be expecting

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...