Splunk Search

Query src + dst subnet and action

tbayer82
New Member

Dear all,

I'm trying to search for denied actions in a subnet, regardless if it is the source or destination.

I tried those without success, maybe you can help me out. Thank you!

index=* AND src="192.168.1.0/24" OR dst="192.168.1.0/24" AND action=deny

index=* action=deny AND src_ip=192.168.1.0/24 OR dst_ip=192.168.1.0/24

Just found it:

index=* dstip="192.168.1.0/24" OR srcip="192.168.1.0/24" action=deny

 

Labels (1)
Tags (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @tbayer82 ,

the order of filters isn't relevant, but if you have OR operators I'd prefer to use parenthesis:

index=* (dstip="192.168.1.0/24" OR srcip="192.168.1.0/24") action=deny

and you don't need to use the AND operator that's the default.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...