Splunk Search

Keeping track of repeat offenders with loopkups

Thuan
Explorer

I have set up a lookup table that consists of a number of offenses that need to be identified for every daily search. Each search works fine and output the IP along with the offending event. I need to keep track of these violations by IP over the time line. Notably when a threshold count has been exceeded, an alert is generated.

Your help is requested (1) in generating a file name that records the IP and the offense. The IP is not known until the violation happens. (2) Append additional violations to an IP is the file already exists and (3) trigger an alert if a threshold has been exceeded

Tags (2)
0 Karma

Thuan
Explorer

Thank you.
It works as you described.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could create a lookup table for that with columns such as ip, count, maybe more. When you find a new violation you load the lookup table and compute a new count for that ip, then use outputlookup to write it back to disk.

Your overall scenario sounds like you may want to look at the Splunk App for Enterprise Security though. Its handling of notable events and incidents may be exactly what you need. See http://apps.splunk.com/app/263/

0 Karma

araitz
Splunk Employee
Splunk Employee

See this blog post for an example of maintaining state with lookups:

http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...