web analytics

Splunk: How to Make Lookup Based on Wildcards – Source: socprime.com

Rate this post

Source: socprime.com – Author: Alex Verbniak

[post-views]

November 25, 2024 · 1 min read

Splunk: How to Make Lookup Based on Wildcards

1) Add to transforms.conf stanza:

[field_from_sourcetype]

batch_index_query = 0

case_sensitive_match = 0

filename = field_from_sourcetype.csv

match_type = WILDCARD(Sourcetype)

JOIN FOR FREE

2) Create field_from_sourcetype.csv file with wilcards and put it to lookups folder:

Sourcetype,field_name

*apache*,http_method

*access_combined*,http_method

*cloudtrail*,eventName

*ms:aad*,Category

*nginx*,http_method

*ms:o365*,Workload

*office365*,Workload

*o365*,Workload

*powershell*,EventCode

*windows.ps*,EventCode

*slack*,action

*sysmon*,EventCode

*zscaler*,http_method

*system.security*,EventCode

*winlog*,EventCode

*wineventlog*,EventCode

*windows.security*, EventCode

As result – field_name will be populated based on list with wildcards:

Was this article helpful?

Like and share it with your peers.

Related Posts

Original Post URL: https://socprime.com/blog/splunk-how-to-make-lookup-based-on-wildcards/

Category & Tags: Blog,Knowledge Bits,SIEM,SIEM & EDR,Splunk – Blog,Knowledge Bits,SIEM,SIEM & EDR,Splunk

Views: 1

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post