Splunk Search

substitute a value in results

arapozo
Explorer

In windows events on a lot of cases you get a result code from them in hex notation, then you have to look them up and see what each hex means. Is there any way to change the hex to a meaningful expression by substituting the hex code with its meaning? Preferably at search time.

Tags (1)
1 Solution

dwaddle
SplunkTrust
SplunkTrust

Yes, you can use a lookup table for this. Some work has been done in this area already by ftk, and packaged into an app. Could http://splunkbase.splunk.com/apps/All/4.x/Add-On/app:Windows+Event+Codes+Lookup help you?

View solution in original post

dwaddle
SplunkTrust
SplunkTrust

Yes, you can use a lookup table for this. Some work has been done in this area already by ftk, and packaged into an app. Could http://splunkbase.splunk.com/apps/All/4.x/Add-On/app:Windows+Event+Codes+Lookup help you?

dwaddle
SplunkTrust
SplunkTrust

It should yes, lookups are applied at search time. See http://www.splunk.com/base/Documentation/latest/Knowledge/Addfieldsfromexternaldatasources for more information on lookups.

0 Karma

arapozo
Explorer

Will this work with my already indexed data?

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...