Splunk Dev

'if like' help

jacqu3sy
Path Finder

Hi,

Struggling to get this to work. I'm trying to create a new field called 'severity' with specific values returned should a particular file extension be detected.

Two example values would be as follows;

bigdog.exe
bigcat.bat

With the above values then found within the field 'threat'. The logic Im trying is as follows, with the idea being that the .bat file will return a severity of high, and the .exe as low. But when trying this both come out as a low.

| eval severity=if(like(threat, "*.bat"), "high", "low")

I suspect the problem is something to do with the use of the asterix which is needed as the values change with the exception of the file extension, but cant work out how to fix. any ideas? Thanks

Tags (1)
0 Karma
1 Solution

harsmarvania57
Ultra Champion

Hi @jacqu3sy,

Please try this | eval severity=if(like(threat, "%.bat"), "high", "low") , for wildcard you need to use % instead of * with like

View solution in original post

0 Karma

jacqu3sy
Path Finder

Never mind, got it to work;

| eval severity=if(like(threat, "%.bat%"), "High", "Low")

0 Karma

harsmarvania57
Ultra Champion

Hi @jacqu3sy,

Please try this | eval severity=if(like(threat, "%.bat"), "high", "low") , for wildcard you need to use % instead of * with like

0 Karma

jacqu3sy
Path Finder

Yeah, found it in the end! Thanks for your quick reply.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...