Splunk Search

How do I create a field extraction that match/pick only the event which contains "ccexpire"?

Borntowin
Loves-to-Learn Everything

I would like to match/pick only the event which contains "ccexpire".

sample event :-

09/Dec/2021 23:52:39,Query,"SELECT ccexpire FROM creditcard WHERE userid = 624",7

 

There are many events which has ccexpire would like to extract the events which has ccexpire.

Labels (1)
0 Karma

Borntowin
Loves-to-Learn Everything

Thank you.. But how do i  pick those events and map it to some field as i need to get the count.

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @Borntowin 

you can try using
| stats count 

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @Borntowin 

one way you can do it search for keyword ccexpire , to filter out events 

<your query>  | search  "*ccexpire *"

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...