<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to search over multiple lines in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-over-multiple-lines/m-p/486363#M136064</link>
    <description>&lt;P&gt;Hello together,&lt;/P&gt;

&lt;P&gt;I want to search for "Binding Type: 0" in the following example log:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;LogName=Directory Service&lt;BR /&gt;
SourceName=Microsoft-Windows-ActiveDirectory_DomainService&lt;BR /&gt;
EventCode=2889&lt;BR /&gt;
EventType=4&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=XXXXX&lt;BR /&gt;
User=NOT_TRANSLATED&lt;BR /&gt;
Sid=S-1-5-7&lt;BR /&gt;
SidType=0&lt;BR /&gt;
TaskCategory=LDAP Interface&lt;BR /&gt;
OpCode=The operation completed successfully.&lt;BR /&gt;
RecordNumber=7362133&lt;BR /&gt;
Keywords=Classic&lt;BR /&gt;
Message=The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a clear text (non-SSL/TLS-encrypted) LDAP connection. &lt;BR /&gt;
 Client IP address:&lt;BR /&gt;
1.1.11.1:5555 &lt;BR /&gt;
Identity the client attempted to authenticate as:&lt;BR /&gt;
XXX\XXXX&lt;BR /&gt;
Binding Type:&lt;BR /&gt;
0&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;The problem is that the value 0 is a new line. &lt;BR /&gt;
Do you know how can I search for this?&lt;/P&gt;

&lt;P&gt;Please help.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 02:16:07 GMT</pubDate>
    <dc:creator>ahmet_goekduman</dc:creator>
    <dc:date>2020-09-30T02:16:07Z</dc:date>
    <item>
      <title>How to search over multiple lines</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-over-multiple-lines/m-p/486363#M136064</link>
      <description>&lt;P&gt;Hello together,&lt;/P&gt;

&lt;P&gt;I want to search for "Binding Type: 0" in the following example log:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;LogName=Directory Service&lt;BR /&gt;
SourceName=Microsoft-Windows-ActiveDirectory_DomainService&lt;BR /&gt;
EventCode=2889&lt;BR /&gt;
EventType=4&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=XXXXX&lt;BR /&gt;
User=NOT_TRANSLATED&lt;BR /&gt;
Sid=S-1-5-7&lt;BR /&gt;
SidType=0&lt;BR /&gt;
TaskCategory=LDAP Interface&lt;BR /&gt;
OpCode=The operation completed successfully.&lt;BR /&gt;
RecordNumber=7362133&lt;BR /&gt;
Keywords=Classic&lt;BR /&gt;
Message=The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a clear text (non-SSL/TLS-encrypted) LDAP connection. &lt;BR /&gt;
 Client IP address:&lt;BR /&gt;
1.1.11.1:5555 &lt;BR /&gt;
Identity the client attempted to authenticate as:&lt;BR /&gt;
XXX\XXXX&lt;BR /&gt;
Binding Type:&lt;BR /&gt;
0&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;The problem is that the value 0 is a new line. &lt;BR /&gt;
Do you know how can I search for this?&lt;/P&gt;

&lt;P&gt;Please help.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:16:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-over-multiple-lines/m-p/486363#M136064</guid>
      <dc:creator>ahmet_goekduman</dc:creator>
      <dc:date>2020-09-30T02:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to search over multiple lines</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-over-multiple-lines/m-p/486364#M136065</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;
you can use the regex command, something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your_search
| regex "(?ms)Binding\s+Type:\s+0"
| ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can test the regex at &lt;A href="https://regex101.com/r/B7f8Yz/1"&gt;https://regex101.com/r/B7f8Yz/1&lt;/A&gt; .&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 15:16:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-over-multiple-lines/m-p/486364#M136065</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2019-09-26T15:16:01Z</dc:date>
    </item>
  </channel>
</rss>

