Splunk Search

Firewall logs

rahul8777
Explorer

sourcetype=cp_log action!=Drop OR action!=Reject OR action!=dropped 

I  am socked ,when i am searching with above query in Splunk search for my checkpoint logs  .it showing me Drop traffic ,although i have clearly mentioned in query that i don't need Drop traffic(action!=Drop)

Kindly help me on this!

Labels (1)
0 Karma
1 Solution

rahul8777
Explorer
0 Karma

rahul8777
Explorer

Thanks kamlesh

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@rahul8777 

You have used OR operator for filter , If you want to exclude multiple terms or values you need to use AND operator,  like 

sourcetype=cp_log (action!=Drop AND action!=Reject AND action!=dropped )

 

Thanks
KV
▄︻̷̿┻̿═━一  😜

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated. 

Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...