Security

Issue with excluding a decoded base64 command

vnarahari
Loves-to-Learn Lots

I have been working on decoding a base64 encoded command using the decrypt2 app. I have successfully decoded the string but facing difficulty excluding or searching and also running stats of decoded field which gives a "p" thing as a result.

Examples of | Search NOT:

vnarahari_0-1712088517693.png

 


Example of Stats resulted "p":

vnarahari_0-1712087927555.png

| rex field="process" ".*-(e|E)(n|N)[codemanCODEMAN]{0,12}\ (?<process_enc>[A-Za-z\d+/=]*)?"
| decrypt field=process_enc b64 emit('process_decoded')
| stats count by process_decoded

Could someone please provide guidance on the correct syntax to exclude or search the decoded field using search not or using a lookup and help clarify the "P" thing from stats command? DECRYPT2 


Tags (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

I don't know the decrypt command so this might be completely irrelevant, but, is the output (emitted) field a multi value field and if so do you need to use mvexpand to separate out the strings that you want to filter on?

Another possibility is perhaps the regex command

| regex process_decoded!="SELECT"
0 Karma

vnarahari
Loves-to-Learn Lots

@ITWhisperer Thanks for your response, It's not multivalued field and tried regex which isn't excluding the results as well.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...