<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Address in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287473#M87026</link>
    <description>&lt;P&gt;Just a note -- you can also run CIDR matches in the base search. E.g., &lt;CODE&gt;index=sources_Ip sources_ip=10.1.4.0/24 OR sources_ip=10.1.5.0/24&lt;/CODE&gt;. &lt;/P&gt;</description>
    <pubDate>Fri, 23 Oct 2015 15:20:15 GMT</pubDate>
    <dc:creator>David</dc:creator>
    <dc:date>2015-10-23T15:20:15Z</dc:date>
    <item>
      <title>IP Address</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287471#M87024</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I want to find the  IP address : 10.1.4.0 &lt;STRONG&gt;to&lt;/STRONG&gt; 10.1.41.128 on Splunk Search.&lt;BR /&gt;
Is there an efficient query than OR ? (index=sources_Ip (sources_ip="10.1.4.0" OR sources_ip="10.1.4.1" OR sources_ip="1.1.4.2" OR ...) )&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;

&lt;P&gt;S.V&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:39:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287471#M87024</guid>
      <dc:creator>rahmania</dc:creator>
      <dc:date>2020-09-29T07:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: IP Address</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287472#M87025</link>
      <description>&lt;P&gt;You could use wildcards to simplify the query.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=sources_Ip sources_ip="10.1.*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or perhaps you can use CIDRs.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=sources_Ip | where (cidrmatch("10.1.4.0/24", sources_ip) OR cidrmatch("10.1.5.0/24", sources_ip) ...) | ...
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 23 Oct 2015 12:19:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287472#M87025</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-10-23T12:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: IP Address</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287473#M87026</link>
      <description>&lt;P&gt;Just a note -- you can also run CIDR matches in the base search. E.g., &lt;CODE&gt;index=sources_Ip sources_ip=10.1.4.0/24 OR sources_ip=10.1.5.0/24&lt;/CODE&gt;. &lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 15:20:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IP-Address/m-p/287473#M87026</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2015-10-23T15:20:15Z</dc:date>
    </item>
  </channel>
</rss>

