Hello,
I’d like to create an alert on ransomware detections. I have file events logs and their most important field is ‘file_name’. It looks like this:
File_name
File1.txt
File2.pdf
File3.xls...
...ac | 12.8 |
03468| iOS | 18.0 |
97621| Android | 18.8 |
However, I need to check certain AppVersions against the Platform.
I imagine it would need multiple i...
Hello community,
like to ask for support to get over conditional formatting. I have 3 different products in a group. Product A, B and C and I need to add for each of them a different formula (c...
...ny time. I have 3 of these types of conditions, but they are all under the same field name. The struggle for me is combining these if else functions into one multi conditionalfunction. I have s...
Hi,
My scenario is that I have Counts of Total Requests, Success, Failure & Failure% for time span of every 30 mins over last 2 hours
Let's say first 30mins I got 100 hits and failure% is m...
...ctual_Time_to_Resolve/3600|stats count(Number),sum(BTTR) as BTTR_Sum, perc95(BTTR) as P95 by "Group service"
every event has Actual_Time_to_Resolve based on which,i calculate BTTR and then P95 which is the 9...
...nService=if(enteredService<beginTime AND (isnull(leftService) OR leftService>beginTime),1,0)
The problem is I want to sum up all of these 1s but only once for each distinct serial number (a...
Hi
I am New to Splunk
I have created one dashboard like below
ProcessName LastUpdated
ProcessA 2019-05-16 14:42:21.12
ProcessB 2019-05-16 14:50:21.12
ProcessC ...
Hi all
I am trying to use the eval case function to populate a new field based on the values of 2 existing fields that meet certain string value matching.
For example:
| eval ValueY=case(S...
...he row field value and transforming it to a sha256 value using eval statement.
Problem is the sha256() function does not appear to work, the value passed is the whole eval line?
<condit...