Splunk Search

How to find the data from nested log

john_snow
Engager

I am using below query 
index=aws earliest=-12h eventName=AuthorizeSecurityGroupIngress "items{}.cidrIp"="0.0.0.0/0" AND "items{}.port"!=8080 AND "items{}.port"!=22 AND "items{}.port"!=80 AND "items{}.port"!=443 

to get data like if a user is making any changes and using the above-mentioned ports then it is not going to show the data and it is giving me the exact results but when I have a log that has nested ports then it is not giving me the actual result. eg

items: []

    {port: 12345}
    {port: 22}
It means if we have a nested log and it contains the above-mentioned ports then it should show the result.

Any thoughts on this?

Labels (1)
Tags (2)
0 Karma

to4kawa
Ultra Champion

try spath , mvexpand , make table and search what you want.

0 Karma
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...