Splunk Search

Log Analysis Request for IP Address Values

Tajuddin
Explorer

I need to perform an analysis based on a lookup file named checkin_rooms.csv, which includes a column confroom_ipaddress with values such as:

  • 10.40.89.76
  • 17.76.42.44
  • 17.200.126.20

For each IP address in this file, I want to check the Splunk logs for the following conditions in the index=fow_checkin:

  1. There is a message containing "IpAddress(from request body)"
  2. There is no message associated with the same IP address that contains display button:panel-* in other events.

Example Log Entries:

  1. message: Display Option Request Source: TouchPanel, IpAddress(from request body): null, Action: buttonDisplay, Timezone: null and IpAddress(from request header): 17.200.126.20
  2. message: display button:panel-takeover for ipaddress: 17.200.126.20

Could someone please guide me on how to construct this query to identify which IP addresses from the lookup file meet these criteria? Thanks in advance

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Tajuddin ,

in addition to the questions from @PickleRick I need to know: the two conditions you listed are related with OR or AND?

then what's the name of the field (in the main search) to compare with confroom_ipaddress of the checkin_rooms.csv lookup? i use IP_Address but you can change.

anyway, eventually change my main search:

 

index=fow_checkin 
[| inputlookup checkin_rooms.csv | rename confroom_ipaddress AS IP_Address | fields IP_Address ]
("IpAddress(from request body)" OR NOT "display button:panel-*")
| ...

 

Ciao.

Giuseppe

0 Karma

PickleRick
SplunkTrust
SplunkTrust

This can have multiple solutions depending on your data parameters (especially cardinality).

Your main problem (performancewise) will be the second condition. Because how can you find something that's not there? You have to list everything that is there and compare with what you get from the first conditon. With a small result set that's relatively quick but with a big one - not so much.

Also:

1. Do you have any fields extracted from your events?

2. In the second type of events is there a space between ipaddress: and the actual address or not?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...