Splunk Search

Keeping track of repeat offenders with loopkups

Thuan
Explorer

I have set up a lookup table that consists of a number of offenses that need to be identified for every daily search. Each search works fine and output the IP along with the offending event. I need to keep track of these violations by IP over the time line. Notably when a threshold count has been exceeded, an alert is generated.

Your help is requested (1) in generating a file name that records the IP and the offense. The IP is not known until the violation happens. (2) Append additional violations to an IP is the file already exists and (3) trigger an alert if a threshold has been exceeded

Tags (2)
0 Karma

Thuan
Explorer

Thank you.
It works as you described.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could create a lookup table for that with columns such as ip, count, maybe more. When you find a new violation you load the lookup table and compute a new count for that ip, then use outputlookup to write it back to disk.

Your overall scenario sounds like you may want to look at the Splunk App for Enterprise Security though. Its handling of notable events and incidents may be exactly what you need. See http://apps.splunk.com/app/263/

0 Karma

araitz
Splunk Employee
Splunk Employee

See this blog post for an example of maintaining state with lookups:

http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...