Splunk Search

Keeping track of repeat offenders with loopkups

Thuan
Explorer

I have set up a lookup table that consists of a number of offenses that need to be identified for every daily search. Each search works fine and output the IP along with the offending event. I need to keep track of these violations by IP over the time line. Notably when a threshold count has been exceeded, an alert is generated.

Your help is requested (1) in generating a file name that records the IP and the offense. The IP is not known until the violation happens. (2) Append additional violations to an IP is the file already exists and (3) trigger an alert if a threshold has been exceeded

Tags (2)
0 Karma

Thuan
Explorer

Thank you.
It works as you described.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could create a lookup table for that with columns such as ip, count, maybe more. When you find a new violation you load the lookup table and compute a new count for that ip, then use outputlookup to write it back to disk.

Your overall scenario sounds like you may want to look at the Splunk App for Enterprise Security though. Its handling of notable events and incidents may be exactly what you need. See http://apps.splunk.com/app/263/

0 Karma

araitz
Splunk Employee
Splunk Employee

See this blog post for an example of maintaining state with lookups:

http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...