Splunk Search

How do I create a field extraction that match/pick only the event which contains "ccexpire"?

Borntowin
Loves-to-Learn Everything

I would like to match/pick only the event which contains "ccexpire".

sample event :-

09/Dec/2021 23:52:39,Query,"SELECT ccexpire FROM creditcard WHERE userid = 624",7

 

There are many events which has ccexpire would like to extract the events which has ccexpire.

Labels (1)
0 Karma

Borntowin
Loves-to-Learn Everything

Thank you.. But how do i  pick those events and map it to some field as i need to get the count.

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @Borntowin 

you can try using
| stats count 

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @Borntowin 

one way you can do it search for keyword ccexpire , to filter out events 

<your query>  | search  "*ccexpire *"

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...