Splunk Search

Watchlist Lookup

opsec
New Member

Hello, we need help setting up an ongoing query against a watchlist of suspicious IP addresses. We have made the following config changes so far with no results:

  1. created a .CSV file in $SPLUNKroot\etc\apps\search\lookups (see sample contents below)

    bad_ip,suspicious
    X.X2.12.12,1
    X.X3.12.13,1
    X.X4.191.4,1
    X.X5.191.14,1

  2. create the following props.conf; and transform.conf in \search\local\

props.conf

[cisco_asa]
LOOKUP-watch = sampl_watchlist bad_ip AS src

transforms.conf

[sampl_watchlist]
filename = sampl_watchlist.csv

Basically, how can we run our firewall logs against the watch list and alert on all matches. Thanks.

Tags (2)
0 Karma

lguinn2
Legend

This should do it:

sourcetype=cisco_asa suspicious=1

because you defined an automatic lookup in props.conf

BTW, I would add the following to transforms.conf

min_matches = 1
default_match = "no match"

which will let you do other interesting searches, too.

0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...