Hello,
I’d like to create an alert on ransomware detections. I have file events logs and their most important field is ‘file_name’. It looks like this:
File_name
File1.txt
File2.pdf
File3.xls...
...ac | 12.8 |
03468| iOS | 18.0 |
97621| Android | 18.8 |
However, I need to check certain AppVersions against the Platform.
I imagine it would need multiple i...
Hi all,
I am trying to run a basic search where I am trying to print table based on where and like() condition. But its not working. Following is a query. It is always showing 0 results.
index="t...
Hi Team,
There are 2 fields added in my search. but it's searching for same value.
But i need a count of result where the search value present in field 1 and 2.
Hi,
I have used eval with multiple if conditions and it's failing. Kindly help.
source = "2access_30DAY.log"
| eval new_field = if(status==200, "I love you Suman", "I love you Cloeh", i...
Hi I tried to search as below, with where in(VALUELIST) function as described in: http://docs.splunk.com/Documentation/Splunk/6.6.0/SearchReference/ConditionalFunctions
sourcetype=foo T...
Hello,
I have the following field values returned from a base search
Field Name
14.2
19.95
InvalidCompositeMsmtA
0
5.6
CompositeIndexInitializing
I need to remove the decimal plac...
...abel location The final result of the request is : I want to have the static Icon in two colors : Orange : severity between 0 and 2 red : severity between 3 and 4...