I have a table that refers to our threat intelligence IoC, and a table that refers to the company user logins.
I want to find the logins that come from an Ip address contained in our IoC list.
i tried with
"o365_management_activity" AND Operation=UserLoggedIn
| table user, src_ip
| rename src_ip AS event.indicator
| join event.indicator [search (index="threatstream_summary") (sourcetype="stash")
| table event.indicator]
but i cannot find any result (even if i remove "AND Operation=UserLoggedIn").
What am i missing?
thank you for helping
i tried a lot of query and read a lot, but no results
One thing that is missing is an index name in the base search. Without it, Splunk will only read your default indexes (if you have any defined), which may not contain the data you seek.
Try to avoid the
joincommand since it does not perform well. Tryappend, instead. How Splunk interprets field names with dots can be problematic so consider using src_ip instead of event.indicator.