Splunk Enterprise Security

How to show results with null values and another value with wildcard?

tromero3
Path Finder

I have a field called "bunit" and I need to filter on results that either have a null value OR a value that contains "servers". I need to use wildcard with the servers because all the results are different, I just need to see anything that contains servers in it.

Adding where isnull(bunit) to the end of my search gives me all of the null results but how do I add the part where I look for any result with servers as a value?(using wildcard) So I want it to show both any field with null value or any field that contains servers in it.

Thank you!

0 Karma
1 Solution

jpolvino
Builder

You could try the like command:

Example:
where isnull(bunit) OR like(bunit,"%wildcard_is_pct%")

Here is the manpage

View solution in original post

0 Karma

jpolvino
Builder

You could try the like command:

Example:
where isnull(bunit) OR like(bunit,"%wildcard_is_pct%")

Here is the manpage

0 Karma

tromero3
Path Finder

This works, thank you 🙂

Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...