Hey there Splunk hero's,
Story/Background:
So, there is this variable called "src_ip" in my correlation search. The "src_ip" is a more than 5000+ ip address.
What i am doing is matching these i...
See more...
Hey there Splunk hero's,
Story/Background:
So, there is this variable called "src_ip" in my correlation search. The "src_ip" is a more than 5000+ ip address.
What i am doing is matching these ip address which should not be in a particular CIDR range using cidrmatch function which works prefectly.
Which looks something like this :
| where (NOT cidrmatch("34.20.223.128/25",src_ip) AND NOT cidrmatch("13.9.22.0/25",src_ip) AND NOT cidrmatch("13.56.21.18/25",src_ip) AND NOT cidrmatch("35.17.29.0/26",src_ip) AND NOT(many-more,src_ip))
SOLUTION REQUIRED:
Now, coming to the part where i need your help is .
I want to simply this. SOLUTION Tried: PART 1: Solutions which i have searched over the forum tell me to create a lookup table and look through it.
So, I have created a lookup table named "match_cidr.csv". This csv/lookup file consist of more that 100+ CIDR blocks under a variable called cidr_match_src_ip. What i have tried looking into this via this command. there is a tstat command as well so,
Query looks like this
[ | inputlookup match_cidr.csv | where src_ip != cidr_match_src_ip] ===> this won't work since i am comparing a CIDR to IP address directly. where NOT cidrmatch([| inputlookup match_cidr.csv], src) ==> tried this as well
What can i use here or what other things can you recommend me to do. Feel free to ask any more question to me if my message isn't clear