<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SPLUNK AND Condition in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589487#M205275</link>
    <description>&lt;P&gt;Please can you mark the response which contains the solution you used as the solution so that others with similar questions might benefit?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Mar 2022 10:16:33 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2022-03-17T10:16:33Z</dc:date>
    <item>
      <title>How to use Splunk AND command to find field 3?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589018#M205131</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;++EXT-ID[05] FLD[Wallet Provider Device..] FRMT[TLV] LL[1] LEN[32] DATA[4AD74D9421FE60B5688EF727F1BC7488] ++EXT-ID[06] FLD[Wallet Provider Accoun..] FRMT[TLV] LL[1] LEN[32] DATA[4AD74D9421FE60B5688EF727F1BC7488] ++EXT-ID[07] FLD[Wallet Provider Reason..] FRMT[TLV] LL[1] LEN[32] DATA[30DA9557329255041D0B5FC268651435]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wanted to identify the list where&amp;nbsp;FLD[Wallet Provider Device..]&amp;nbsp; and&amp;nbsp;FLD[Wallet Provider Accoun..]&amp;nbsp; are present but&amp;nbsp;FLD[Wallet Provider Reason..] is missing&lt;/P&gt;
&lt;P&gt;In the above examples all three fields are present. I wanted to identify Field 1, Field 2 received but field 3 is missing&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 14:24:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589018#M205131</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-16T14:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589026#M205134</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;could you try this regex?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "FLD\[(?&amp;lt;FLD_Device&amp;gt;[^\]]+)\].*FLD\[(?&amp;lt;FLD_Account&amp;gt;[^\]]+)\].*FLD\[(?&amp;lt;FLD_Reason&amp;gt;[^\]]+)\]"&lt;/LI-CODE&gt;&lt;P&gt;that you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/qXNk4U/1" target="_blank"&gt;https://regex101.com/r/qXNk4U/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 07:02:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589026#M205134</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-15T07:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589053#M205145</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jayeshrajvir_0-1647344103408.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18503i8F015B55C9EC4F9D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jayeshrajvir_0-1647344103408.png" alt="jayeshrajvir_0-1647344103408.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;i tried but no matching condition&lt;/P&gt;&lt;P&gt;Test String&lt;/P&gt;&lt;P&gt;++EXT-ID[05] FLD[Wallet Provider Device..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;BR /&gt;++EXT-ID[0A] FLD[Wallet Account Email A..] FRMT[TLV] LL[1] LEN[64] DATA[E4C55D23036D23E668790A1272C3AABE129096D830532C4301D000FFA2D15062]&lt;BR /&gt;++EXT-ID[06] FLD[Wallet Provider Accoun..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 11:35:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589053#M205145</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-15T11:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589061#M205147</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand: the test string is one event or more events?&lt;/P&gt;&lt;P&gt;My regex is for one event, if you have a row for each event, you have to use a different regex&amp;nbsp;and the only way to understand if the field is&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;FLD[Wallet Provider Device..]&amp;nbsp; or FLD[Wallet Provider Accoun..]&amp;nbsp; or FLD[Wallet Provider Reason..] it could be the format of the field, could you share some sample for your three fields?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm interested only on the format, e.g. \w\w\w\d\d\d\w\w or \w+\@\w+\.\w+&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 11:54:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589061#M205147</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-15T11:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589064#M205148</link>
      <description>&lt;P&gt;Do you mean something like this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(?&amp;lt;wallet_provider&amp;gt;FLD\[Wallet Provider Device\.\.\]).+? (?&amp;lt;wallet_account&amp;gt;FLD\[Wallet Account Email A\.\.\]).+?(?!FLD\[Wallet Provider Reason\.\.\])&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 15 Mar 2022 12:06:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589064#M205148</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-15T12:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589067#M205150</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;.* would match everything, basically 1st condition&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/qXNk4U/1" target="_blank"&gt;https://regex101.com/r/qXNk4U/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have a logs where&lt;/P&gt;&lt;P&gt;1. the fields highlighted in both blue and red present,&lt;/P&gt;&lt;P&gt;2. only fields highlighted in blue present and&lt;/P&gt;&lt;P&gt;3. field highlighted in red present&lt;/P&gt;&lt;P&gt;I wanted to fetch transactions log where it should fetch fields highlighted in blue is present and field highlighted in red is not present&amp;nbsp;&lt;/P&gt;&lt;P&gt;+EXT-ID[02] FLD[02 Wallet Provider] FRMT[LLVAR-TLV-Group..] LL[2] LEN[40] DATA[??????????????????????????????????]&lt;BR /&gt;&lt;FONT color="#00FFFF"&gt;&lt;STRONG&gt;++EXT-ID[05] FLD[Wallet Provider Device..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#00FFFF"&gt;&lt;STRONG&gt;++EXT-ID[06] FLD[Wallet Provider Accoun..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;+&lt;FONT color="#FF0000"&gt;+EXT-ID[07] FLD[Wallet Provider Reason..] FRMT[TLV] LL[1] LEN[64] DATA[5BAAE330347FC58AC794FA535144DAD88440BDF0515AD3B0AE374A7975B612DB]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 12:18:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589067#M205150</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-15T12:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589089#M205155</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as I said, is there a predefined format for&amp;nbsp;&lt;SPAN&gt;FLD[Wallet Provider Device..], FLD[Wallet Provider Accoun..] and FLD[Wallet Provider Reason..]?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If yes, could you share some sample of the three fields?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 13:10:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589089#M205155</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-15T13:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589105#M205161</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the pre-defined format, Device Score and Account Score if present then length will be 2 bytes,&amp;nbsp;Wallet Provider Reason is 32 bytes fixed. Please see below.&lt;/P&gt;&lt;P&gt;Kindly let me know if additional info is required.&lt;/P&gt;&lt;P&gt;++EXT-ID[05] FLD[Wallet Provider Device..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;/P&gt;&lt;P&gt;++EXT-ID[06] FLD[Wallet Provider Accoun..] FRMT[TLV] LL[1] LEN[2] DATA[**]&lt;BR /&gt;++EXT-ID[07] FLD[Wallet Provider Reason..] FRMT[TLV] LL[1] LEN[32] DATA[792194208EDDB782F97EC3C2ACD7FB99]&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 14:08:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589105#M205161</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-15T14:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589110#M205163</link>
      <description>&lt;P&gt;Did you try my suggestion? Here in a regex command to filter for only the events which match the criteria&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| regex _raw="FLD\[Wallet Provider Device\.\.\].+? FLD\[Wallet Account Email A\.\.\].+?(?!FLD\[Wallet Provider Reason\.\.\])"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 14:21:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589110#M205163</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-15T14:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589117#M205166</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I need of a sample of the three fields so I can create the regexes for the extraction, e.g.&amp;nbsp;&lt;SPAN&gt;Device_Score and Account_Score if present have a length of 2 bytes, but what's the format?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can suppose that being they a score they will always have the format of two digits, is it correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Wallet_Provider_Reason has a lenght of 32 bytes, does it means that it always have 32 chars? can&amp;nbsp; these chars be only digits or also letter or also alphanumeric?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;what's the format of&amp;nbsp;Wallet_Provider_Device?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It's the first time that you say that you need to extract also Device_Score and Account_Score, so what's you need?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is that we cannot use the string before square brackets to identify fields, so the only way (if possible) is the format and other eventual rules that are in your logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I need these information to create the regexes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 14:42:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589117#M205166</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-15T14:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589279#M205214</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the format below - Wallet Provider Device Score and Account Score Numeric 02 bytes&lt;/P&gt;&lt;P&gt;whereas Wallet Provider Reason code variable length Alpha Numeric. Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jayeshrajvir_0-1647433607886.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18541i6053D8F8433026F0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jayeshrajvir_0-1647433607886.png" alt="jayeshrajvir_0-1647433607886.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jayeshrajvir_1-1647433648189.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18542i479CB9B9BD13FC38/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jayeshrajvir_1-1647433648189.png" alt="jayeshrajvir_1-1647433648189.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:28:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589279#M205214</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-16T12:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589281#M205215</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your response. Its not working. Please see below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jayeshrajvir_0-1647434279408.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18543i10953CB2B65566C1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jayeshrajvir_0-1647434279408.png" alt="jayeshrajvir_0-1647434279408.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:38:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589281#M205215</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-16T12:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589298#M205217</link>
      <description>&lt;P&gt;It is not working because you have split your event into two lines - try it without the linebreak in the middle&lt;/P&gt;&lt;P&gt;If your events do actually have linebreaks in them, then try adding (?ms) to start of the regex&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:56:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589298#M205217</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-16T12:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589358#M205229</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand: is the EXT-ID a fixed value?&lt;/P&gt;&lt;P&gt;in other words, is [05] always before the&amp;nbsp;&lt;SPAN&gt;Device_Score and [06] always before&amp;nbsp;Account_Score and [07] before Reason?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;if yes you could use three&amp;nbsp; regexes like these:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "EXT\-ID\[05\]\s+FLD\[(?&amp;lt;Device_Score&amp;gt;\d*\d*)
| rex "EXT\-ID\[06\]\s+FLD\[(?&amp;lt;Account_Score&amp;gt;\d*\d*)
| rex "EXT\-ID\[07\]\s+FLD\[(?&amp;lt;Reason&amp;gt;[^\]*)&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:19:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589358#M205229</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-16T15:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589473#M205267</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your support and patience.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes 05 Device Score always logged prior to 06 Account Score.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Jayesh&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:26:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589473#M205267</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-17T09:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589474#M205268</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/243602"&gt;@jayeshrajvir&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;If my answer solves your requirement, please, accept it for the other people of Community..&lt;/P&gt;&lt;P&gt;Ciao and happy splunking.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the Contributors;-)&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:29:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589474#M205268</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-17T09:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589480#M205273</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your support and time. Its working as expected. Much appreciated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Jayesh&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:52:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589480#M205273</guid>
      <dc:creator>jayeshrajvir</dc:creator>
      <dc:date>2022-03-17T09:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK AND Condition</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589487#M205275</link>
      <description>&lt;P&gt;Please can you mark the response which contains the solution you used as the solution so that others with similar questions might benefit?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 10:16:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-AND-command-to-find-field-3/m-p/589487#M205275</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-17T10:16:33Z</dc:date>
    </item>
  </channel>
</rss>

