<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checking when a field value has changed in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/514716#M144867</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I have a similar issue. I want to check if a url classification of the proxy has changed.&lt;/P&gt;&lt;P&gt;Could anybody explain exactly what was done in that search? I don't get it.&lt;/P&gt;&lt;P&gt;In detail my issue is like:&lt;/P&gt;&lt;P&gt;I have a url that is classified as malicious and all traffic to there is blocked. But maybe 2 or 3 days before the url wasn't classified as malicious and so users were able to get to the site. So I need a search which checks if the classification changed within the last few days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Aug 2020 14:52:04 GMT</pubDate>
    <dc:creator>qman</dc:creator>
    <dc:date>2020-08-18T14:52:04Z</dc:date>
    <item>
      <title>Checking when a field value has changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468863#M144863</link>
      <description>&lt;P&gt;Hi team,  I have a highly simplified set of log entries similar to the sample data below:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|makeresults |eval dummy="Dec 09 19:43:45 system1 User_name: User1 Client_version: 1.1"
|append [| makeresults |eval dummy= "Dec 11 19:13:42 system1 User_name: User2 Client_version: 1.1"]
|append [| makeresults |eval dummy= "Dec 11 19:26:07 system1 User_name: User3 Client_version: 1.1"]
|append [| makeresults |eval dummy= "Dec 11 19:33:25 system1 User_name: User4 Client_version: 1.1"]
|append [| makeresults |eval dummy= "Dec 12 05:06:14 system1 User_name: User5 Client_version: 1.1"]
|append [| makeresults |eval dummy= "Dec 12 05:07:53 system1 User_name: User1 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 12 08:41:48 system1 User_name: User1 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 13 08:42:48 system1 User_name: User1 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 14 08:43:48 system1 User_name: User2 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 15 08:44:48 system1 User_name: User3 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 16 18:45:48 system1 User_name: User4 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 17 18:46:48 system1 User_name: User1 Client_version: 1.2"]
|append [| makeresults |eval dummy= "Dec 18 18:46:48 system1 User_name: User5 Client_version: 1.1"]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Could someone point me to the SPL query that could show me which user(s) have upgraded their "Client_version" and when?  I basically need to track when a field value for a particular user has changed.&lt;BR /&gt;
In the example set above, I want an output (table or graphs) that shows User1:Dec 12 05:07:53 , User2:Dec 14 08:43:48, User3:Dec 15 08:44:48 and User4:Dec 16 18:45:48&lt;/P&gt;

&lt;P&gt;User5 won't show up as his "Client_version" field has not updated.&lt;/P&gt;

&lt;P&gt;And in the case of User1, he has logged in multiple times, but I need to see only the timestamp when his "Client_version" field has changed.&lt;/P&gt;

&lt;P&gt;Thanks very much.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2019 10:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468863#M144863</guid>
      <dc:creator>rleyba828</dc:creator>
      <dc:date>2019-12-21T10:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Checking when a field value has changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468864#M144864</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| makeresults
| eval dummy="Dec 09 19:43:45 system1 User_name: User1 Client_version: 1.1
Dec 11 19:13:42 system1 User_name: User2 Client_version: 1.1
Dec 11 19:26:07 system1 User_name: User3 Client_version: 1.1
Dec 11 19:33:25 system1 User_name: User4 Client_version: 1.1
Dec 12 05:06:14 system1 User_name: User5 Client_version: 1.1
Dec 12 05:07:53 system1 User_name: User1 Client_version: 1.2
Dec 12 08:41:48 system1 User_name: User1 Client_version: 1.2
Dec 13 08:42:48 system1 User_name: User1 Client_version: 1.2
Dec 14 08:43:48 system1 User_name: User2 Client_version: 1.2
Dec 15 08:44:48 system1 User_name: User3 Client_version: 1.2
Dec 16 18:45:48 system1 User_name: User4 Client_version: 1.2
Dec 17 18:46:48 system1 User_name: User1 Client_version: 1.2
Dec 18 18:46:48 system1 User_name: User5 Client_version: 1.1"
| makemv delim="
" dummy
| mvexpand dummy
| rename COMMENT as "this is sample you provide"
| rename COMMENT as "From here, the logic"
| rex field=dummy "(?&amp;lt;time&amp;gt;^.+) (?&amp;lt;system&amp;gt;system\d) User_name: (?&amp;lt;user_name&amp;gt;.+?) Client_version: (?&amp;lt;client_version&amp;gt;.+)"
| eval _time=strptime(time,"%B %d %T")
| table _time system user_name client_version
| streamstats dc(client_version) as session by user_name
| stats earliest(_time) as _time by session user_name
| where session &amp;gt; 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi, @rleyba828&lt;BR /&gt;
How about this?&lt;BR /&gt;
and try &lt;CODE&gt;makemv&lt;/CODE&gt; and &lt;CODE&gt;mvexpand&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2019 02:13:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468864#M144864</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-22T02:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Checking when a field value has changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468865#M144865</link>
      <description>&lt;P&gt;Excellent!  I tried this on my live data, and the logic worked.  Thanks very much.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2019 12:27:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468865#M144865</guid>
      <dc:creator>rleyba828</dc:creator>
      <dc:date>2019-12-22T12:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Checking when a field value has changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468866#M144866</link>
      <description>&lt;P&gt;you are welcome&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2019 13:29:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/468866#M144866</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-22T13:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Checking when a field value has changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/514716#M144867</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I have a similar issue. I want to check if a url classification of the proxy has changed.&lt;/P&gt;&lt;P&gt;Could anybody explain exactly what was done in that search? I don't get it.&lt;/P&gt;&lt;P&gt;In detail my issue is like:&lt;/P&gt;&lt;P&gt;I have a url that is classified as malicious and all traffic to there is blocked. But maybe 2 or 3 days before the url wasn't classified as malicious and so users were able to get to the site. So I need a search which checks if the classification changed within the last few days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 14:52:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Checking-when-a-field-value-has-changed/m-p/514716#M144867</guid>
      <dc:creator>qman</dc:creator>
      <dc:date>2020-08-18T14:52:04Z</dc:date>
    </item>
  </channel>
</rss>

