Splunk Search

Tstats: How to Include new field?

alex4
Loves-to-Learn Lots

I want to use the new search signature="test" in the below search.

I don't want to add this new signature to the existing lookup.

 

 

| tstats summariesonly=true values  (IDS_Attacks.action) as action 
    from datamodel=Intrusion_Detection.IDS_Attacks 
    by _time, IDS_Attacks.src, IDS_Attacks.dest, IDS_Attacks.signature 
| `drop_dm_object_name(IDS_Attacks)`
| lookup rq_subnet_zones Network as dest OUTPUTNEW Name, Location
| lookup rq_subnet_zones Network as src OUTPUTNEW Name, Location
| search NOT Name IN ("*Guest*","*Mobile*","*byod*","*visitors*","*phone*")
| lookup rq_emergency_signature_iocs_v01 ioc as signature OUTPUTNEW last_seen 
| where isnotnull(last_seen) 
| dedup src 
| head 51

 

Labels (1)
Tags (1)
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...