All Apps and Add-ons

I'd like to search on the decode output from the base64 command; could someone point me in that direction

rgaleone1
Path Finder

I am decoding fields and appending or replacing them in events. I would like to search on the newly appended or replaced values, but I am having difficulty forming the search. Has anyone gotten this to work? An example would be excellent.

Tags (3)
0 Karma

cleroux_splunk
Splunk Employee
Splunk Employee

That should help:

source="/tmp/tmp.log" | base64 field="secret" action="decode" | search secret="*127.0.0.1*"

Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Seamless IT/OT Security: A Hands-On Look at the Cisco Cyber Vision Splunk Add-on

With just a few clicks, you can ingest critical OT asset details, vulnerabilities, baseline deviations, ...