Splunk Search

Firewall logs

rahul8777
Explorer

sourcetype=cp_log action!=Drop OR action!=Reject OR action!=dropped 

I  am socked ,when i am searching with above query in Splunk search for my checkpoint logs  .it showing me Drop traffic ,although i have clearly mentioned in query that i don't need Drop traffic(action!=Drop)

Kindly help me on this!

Labels (1)
0 Karma
1 Solution

rahul8777
Explorer
0 Karma

rahul8777
Explorer

Thanks kamlesh

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@rahul8777 

You have used OR operator for filter , If you want to exclude multiple terms or values you need to use AND operator,  like 

sourcetype=cp_log (action!=Drop AND action!=Reject AND action!=dropped )

 

Thanks
KV
▄︻̷̿┻̿═━一  😜

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated. 

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...