Splunk Enterprise Security

Splunk Enterprise Security: Look up file in correlation searches not populating

wgawhh5hbnht
Communicator

The following 3 Correlation Searches within ES have the error "lookup file is not populated":

  • Detect AWS Console Login by User from New Region
  • Detect AWS Console Login by User from New Country
  • Detect AWS Console Login by User from New City

The lookup file being referenced is "previously_seen_users_console_logins.csv "

When I look at the contents of the file, here is a redacted & trimmed down version of it:
identity,
arn:aws:sts:::assumed-role//

Why is splunk stating the lookup file is not populated? Is the syntax incorrect?
If there is any documentation on how to set the file up correctly, I would greatly appreciate some guidance on where it is located.

alt text

0 Karma

jawaharas
Motivator

You need to enable the scheduled report - 'ESCU - Previously seen users in CloudTrail' or run below query

sourcetype=aws:cloudtrail eventName=ConsoleLogin 
| rename userIdentity.arn as user 
| iplocation src 
| eval City=if(City LIKE "",src,City),Region=if(Region LIKE "",src,Region) 
| stats earliest(_time) as earliest latest(_time) as latest by user src City Region Country 
| outputlookup previously_seen_users_console_logins.csv 
| stats count
0 Karma

wgawhh5hbnht
Communicator

Enabled search, scheduled it, let it run, & still the 3 CS show "lookup file is not populated". If I manually run the search it returns results.

0 Karma

jawaharas
Motivator

Question-
1. Are you getting result if you run (manually) 'ESCU - Previously seen users in CloudTrail' report
2. If yes, are getting result when you run (manually) any of below reports

  • Detect AWS Console Login by User from New Region
  • Detect AWS Console Login by User from New Country
  • Detect AWS Console Login by User from New City

Also, where you notice the error 'lookup file is not populated'? Can you share screenshot?

0 Karma

wgawhh5hbnht
Communicator
  1. Yes
  2. All 3 searches, when ran manually, return NO RESULTS.

The error comes from configure > content management: en-US/app/SplunkEnterpriseSecuritySuite/ess_content_management?textFilter=Detect%20AWS%20Console%20Login%20by%20User%20
Unfortunately I can't upload another screenshot, as the attach picture only allows for a URL...

0 Karma

jawaharas
Motivator

Thanks for the details. Even I get the same error in 'Content Management' page. But, when I run below query ( of 'Detect AWS Console Login by User from New City' Correlation report) manually after removing the 'where' condition, I get results. Can you try and update here whether you get results?

| inputlookup previously_seen_users_console_logins.csv 
| stats min(earliest) as earliest max(latest) as latest by user City 
| join user type=outer 
    [| inputlookup previously_seen_users_console_logins.csv 
    | stats min(earliest) AS earliestseen by user 
    | fields earliestseen user] 
| eval userStatus=if(earliest >= relative_time(now(), "@d"), "New City","Previously Seen City") 
| eval UserData=if(earliestseen >= relative_time(now(), "@d") OR isnull(earliestseen), "New User","Old User") 
| convert ctime(earliest) ctime(latest) ctime(earliestseen) 
| table user City userStatus earliest latest earliestseen
0 Karma

wgawhh5hbnht
Communicator

I also get results when removing the where clause.

0 Karma

jawaharas
Motivator

Then, if you schedule the report, ideally it should work. Regarding the error - "lookup file is not populated", it's better to create a case in Splunk support.

0 Karma

wgawhh5hbnht
Communicator

I guess I'll be creating a case. The issue is we're using these lookups in Incident Response and we continue to receive alerts on users/cities/regions that we've whitelisted. My assumption is because Splunk believes the lookups are empty. I'm going to leave this open however in the meantime in case someone else has an answer or for when I get an update from Splunk about the issue, then I'll update this.

0 Karma

jawaharas
Motivator

@wgawhh5hbnht
Please accept the answer if it significantly helped resolve your query for the benefit of other forum members, who might run into a similar issue.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...