Splunk Search

Exclude search events for a field containing a specific useragent.

bcherdak
New Member

I am attempting to create a sorted count list of useragents that customers are using to browse my website.

I want to exclude certain results and only show events of unknown agents,bots,vulnerability scanners.

Currently I am using the string

index = UV | where NOT like(ad_UserAgent,"%Mozilla%") OR like(ad_UserAgent,"%Opera%") | stats count by ad_UserAgent | sort - count

Is there something I am doing wrong that is still showing events that contain Mozilla and Opera?

thank you for the assistance.

0 Karma

dturnbull_splun
Splunk Employee
Splunk Employee

A more straightforward search might be:

index=UV ad_UserAgent!=*Mozilla* ad_UserAgent!=*Opera* | top limit=0 ad_UserAgent

richgalloway
SplunkTrust
SplunkTrust

Looks like you need some parens. Have you tried ... | where NOT (like(ad_UserAgent,"%Mozilla%") OR like(ad_UserAgent,"%Opera%")) | ... ?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...