<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic can some one help me in fixing this? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480950#M140427</link>
    <description>&lt;P&gt;how might i incorporate regex into a like eval element in  a search like this. This syntax does not work&lt;/P&gt;

&lt;P&gt;| eval product=case((signature LIKE "%Cipher%") OR (signature LIKE "%SMBv2 signing%") OR (signature LIKE "%Diffie-Hellman%") OR &lt;BR /&gt;
(signature LIKE "%Weak Cryptographic%") OR (signature LIKE "%SHA-%") OR (signature LIKE "%SWEET32%") OR (signature LIKE "%TLS/SSL%") OR&lt;BR /&gt;
(signature LIKE "%Certificate Is Invalid%") OR (signature LIKE "%protocol%"), "Cipher/Protocol/Cert", &lt;BR /&gt;
signature LIKE "%Java%", "Java",&lt;BR /&gt;
signature LIKE regex="[M][S][0-9][0-9][-][0-9][0-9][0-9]", "test",&lt;BR /&gt;
signature LIKE "%Apache%", "Apache",&lt;BR /&gt;
signature LIKE "%Apple%", "Apple",&lt;BR /&gt;
signature LIKE "%Cisco%", "Cisco",&lt;BR /&gt;
| search product=test&lt;BR /&gt;
| dedup signature &lt;BR /&gt;
| table signature product&lt;/P&gt;</description>
    <pubDate>Mon, 02 Mar 2020 07:33:48 GMT</pubDate>
    <dc:creator>vikram1583</dc:creator>
    <dc:date>2020-03-02T07:33:48Z</dc:date>
    <item>
      <title>can some one help me in fixing this?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480950#M140427</link>
      <description>&lt;P&gt;how might i incorporate regex into a like eval element in  a search like this. This syntax does not work&lt;/P&gt;

&lt;P&gt;| eval product=case((signature LIKE "%Cipher%") OR (signature LIKE "%SMBv2 signing%") OR (signature LIKE "%Diffie-Hellman%") OR &lt;BR /&gt;
(signature LIKE "%Weak Cryptographic%") OR (signature LIKE "%SHA-%") OR (signature LIKE "%SWEET32%") OR (signature LIKE "%TLS/SSL%") OR&lt;BR /&gt;
(signature LIKE "%Certificate Is Invalid%") OR (signature LIKE "%protocol%"), "Cipher/Protocol/Cert", &lt;BR /&gt;
signature LIKE "%Java%", "Java",&lt;BR /&gt;
signature LIKE regex="[M][S][0-9][0-9][-][0-9][0-9][0-9]", "test",&lt;BR /&gt;
signature LIKE "%Apache%", "Apache",&lt;BR /&gt;
signature LIKE "%Apple%", "Apple",&lt;BR /&gt;
signature LIKE "%Cisco%", "Cisco",&lt;BR /&gt;
| search product=test&lt;BR /&gt;
| dedup signature &lt;BR /&gt;
| table signature product&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 07:33:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480950#M140427</guid>
      <dc:creator>vikram1583</dc:creator>
      <dc:date>2020-03-02T07:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: can some one help me in fixing this?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480951#M140428</link>
      <description>&lt;P&gt;You're on the right track, but the format for &lt;CODE&gt;like&lt;/CODE&gt;  and &lt;CODE&gt;case&lt;/CODE&gt; is wrong.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval product=case(like(signature,"%Cipher%"), "Cipher/Protocol/Cert" , like(signature,"%Apache%"), "Apache",1=1,"Unknown")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In full:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|eval product=case(
like(signature,"%Cipher%") , "Cipher/Protocol/Cert",
like(signature,"%SMBv2 signing%"), "Cipher/Protocol/Cert",
like(signature,"%Diffie-Hellman%") , "Cipher/Protocol/Cert",
like(signature,"%Weak Cryptographic%"), "Cipher/Protocol/Cert",
like(signature,"%SHA-%") , "Cipher/Protocol/Cert",
like(signature,"%SWEET32%"), "Cipher/Protocol/Cert",
like(signature,"%TLS/SSL%"), "Cipher/Protocol/Cert",
like(signature,"%Certificate Is Invalid%"), "Cipher/Protocol/Cert",
like(signature,"%protocol%"), "Cipher/Protocol/Cert",
like(signature, "%Java%"), "Java",
like(signature ,"%Apache%"), "Apache",
like(signature , "%Apple%"), "Apple",
like(signature ,"%Cisco%"), "Cisco",
match(signature, "[M][S][0-9][0-9][-][0-9][0-9][0-9]"), "test",
1=1, "Unknown"
)
| search product=test
| dedup signature
| table signature product
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Excessive carriage returns for clarity only&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 13:57:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480951#M140428</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2020-03-02T13:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: can some one help me in fixing this?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480952#M140429</link>
      <description>&lt;P&gt;Thank You &lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 18:38:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-some-one-help-me-in-fixing-this/m-p/480952#M140429</guid>
      <dc:creator>vikram1583</dc:creator>
      <dc:date>2020-03-02T18:38:42Z</dc:date>
    </item>
  </channel>
</rss>

