<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limiting Software Enumeration in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519213#M146205</link>
    <description>Can you post your query / dashboard code, so community could help you?</description>
    <pubDate>Sat, 12 Sep 2020 15:07:12 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2020-09-12T15:07:12Z</dc:date>
    <item>
      <title>Limiting Software Enumeration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519210#M146204</link>
      <description>&lt;P&gt;I would like to modify an existing dashboard to limit the Linux package that is being reported.&amp;nbsp; Specifically, I want to see any packages that start with kernel.&amp;nbsp; The plugin that is in use is Software Enumeration (SSH).&amp;nbsp; The existing query returns too many records and is truncated.&amp;nbsp; If I could limit it to see kernel packages only I think it would allow the query to complete.&amp;nbsp; Does anybody have any suggestions how to pass this kernel*?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Sep 2020 14:43:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519210#M146204</guid>
      <dc:creator>mccobalt96</dc:creator>
      <dc:date>2020-09-12T14:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting Software Enumeration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519213#M146205</link>
      <description>Can you post your query / dashboard code, so community could help you?</description>
      <pubDate>Sat, 12 Sep 2020 15:07:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519213#M146205</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-09-12T15:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting Software Enumeration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519215#M146207</link>
      <description>&lt;P&gt;I'm hoping this is what you are looking for:&amp;nbsp; (I'm a newbie).&lt;/P&gt;&lt;P&gt;index=server_logs sourcetype="tenable:sc:vuln" pluginName="Software Enumeration (SSH)" dnsName = "$server$"&lt;BR /&gt;| rex field=pluginText "Linux system\s\:\s+(?&amp;lt;RPM&amp;gt;[^&amp;lt;]+)"&lt;BR /&gt;| rex field=RPM mode=sed "s/\s+/;/g"&lt;BR /&gt;| makemv RPM delim=";"&lt;BR /&gt;| mvexpand RPM&lt;BR /&gt;| table dnsName RPM&lt;BR /&gt;| dedup dnsName RPM&lt;/P&gt;</description>
      <pubDate>Sat, 12 Sep 2020 15:14:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519215#M146207</guid>
      <dc:creator>mccobalt96</dc:creator>
      <dc:date>2020-09-12T15:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting Software Enumeration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519219#M146208</link>
      <description>&lt;P&gt;I believe I figured it out:&lt;/P&gt;&lt;P&gt;index=server_logs sourcetype="tenable:sc:vuln" pluginName="Software Enumeration (SSH)" dnsName = "$server$"&lt;BR /&gt;| rex field=pluginText "Linux system\s\:\s+(?&amp;lt;RPM&amp;gt;[^&amp;lt;]+)"&lt;BR /&gt;| rex field=RPM mode=sed "s/\s+/;/g"&lt;BR /&gt;| makemv RPM delim=";"&lt;BR /&gt;| mvexpand RPM | search RPM="kernel*"&lt;BR /&gt;| table dnsName RPM&lt;BR /&gt;| dedup dnsName RPM&lt;/P&gt;&lt;P&gt;Unfortunately it includes any kernel-* items not just what I am looking for (i.e. kernel-3.10.*).&amp;nbsp; If I could limit it to kernel-3* and kernel-2* I think it would get what I need... Any way to do that?&amp;nbsp; Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 12 Sep 2020 15:32:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519219#M146208</guid>
      <dc:creator>mccobalt96</dc:creator>
      <dc:date>2020-09-12T15:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting Software Enumeration</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519221#M146209</link>
      <description>Nice to hear that you figure it out. Probably this helps you to solve the rest?&lt;BR /&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-can-I-use-regex-with-wildcard-patterns-in-a-search-to/m-p/236537" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/How-can-I-use-regex-with-wildcard-patterns-in-a-search-to/m-p/236537&lt;/A&gt;&lt;BR /&gt;Another option is | where match or like&lt;BR /&gt;r. Ismo</description>
      <pubDate>Sat, 12 Sep 2020 16:31:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Limiting-Software-Enumeration/m-p/519221#M146209</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-09-12T16:31:30Z</dc:date>
    </item>
  </channel>
</rss>

