Activity Feed
- Posted Regex field values to look for a specific character Splunk Search on Splunk Search. 09-05-2019 10:42 AM
- Tagged Regex field values to look for a specific character Splunk Search on Splunk Search. 09-05-2019 10:42 AM
- Tagged Regex field values to look for a specific character Splunk Search on Splunk Search. 09-05-2019 10:42 AM
- Tagged Regex field values to look for a specific character Splunk Search on Splunk Search. 09-05-2019 10:42 AM
- Tagged Regex field values to look for a specific character Splunk Search on Splunk Search. 09-05-2019 10:42 AM
- Posted Trying to match a field with multiple values against a lookuptable on Splunk Search. 09-04-2019 11:50 AM
- Tagged Trying to match a field with multiple values against a lookuptable on Splunk Search. 09-04-2019 11:50 AM
- Tagged Trying to match a field with multiple values against a lookuptable on Splunk Search. 09-04-2019 11:50 AM
- Tagged Trying to match a field with multiple values against a lookuptable on Splunk Search. 09-04-2019 11:50 AM
- Tagged Trying to match a field with multiple values against a lookuptable on Splunk Search. 09-04-2019 11:50 AM
- Posted Re: Search two lookup tables for matching field values on Splunk Search. 09-04-2019 11:41 AM
- Posted Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Tagged Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Tagged Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Tagged Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Tagged Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Tagged Search two lookup tables for matching field values on Splunk Search. 09-04-2019 06:03 AM
- Posted Re: Searching notable events in ES to match user field on Splunk Enterprise Security. 09-03-2019 08:47 AM
- Posted Searching notable events in ES to match user field on Splunk Enterprise Security. 08-29-2019 11:01 AM
- Tagged Searching notable events in ES to match user field on Splunk Enterprise Security. 08-29-2019 11:01 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 |
09-05-2019
10:42 AM
Hi guys I'm looking to extract a value from a field using regex, the field contain different types of data such as Id's, emails, name etc..in the same field.
I want a regex to look for a specific alphabetical character for example z thats followed by 10 numeric character for example z1234567890 I dont want to see any of the other values.
tried this (?\w{7,8})" but it also pull the out any other that start with z such as an email address and the the next 10 characters for example zack@abcdhg
Thanks Mt
... View more
09-04-2019
11:50 AM
I trying to search a lookup table for matching field=user the field contains multiple values for example
user=ID, name, email, address - so when I run the search it only match on email the first value in field user against my lookuptable test1.csv
I there a way for my to split out the values of field user into multiple fields that I can match against my lookuptable.
index=** sourcetype=** event=** | table user | dedup user | lookup test1.csv user outputnew user as matchEvent
... View more
09-04-2019
11:41 AM
Worked great, thanks
... View more
09-04-2019
06:03 AM
Hi trying to search two lookup tables for matching fields values, both tables have the same fields.
Just looking to compare my output UserFromTest1 and UserFromTest2 for a match.
| inputlookup test1.csv UserName as User OutputNew User as UserFromTest1
| inputlookup test2.csv UserName as User OutputNew User as UserFromTest2
Thanks
... View more
09-03-2019
08:47 AM
great thanks, got it to work using your search. 5*
... View more
08-29-2019
11:01 AM
Folks, I'm trying to match a field (user) from a search to see if any previous notable events ES have been generated for that use and output any match.
Cannot seem to get any output
Tried the below:
index=*** sourcetype=*** category="alerttype"| rex field=fieldWithUserID "(?[^:]+$)" | search [ search notable
| fields user dest
| format "(" "(" "OR" ")" "OR" ")"]
... View more
11-15-2016
09:12 AM
Thanks Rich, Tried this but getting an error
sourcetype=proxy github.com cs_uri_path!=/ cs_uri_path="*" |rex cs_uri_path="*" "\/(?[^\/]+)" |
... View more
11-15-2016
08:46 AM
Hi guys I'm new to Splunk 🙂
A search I created returns the following in a specific field: /Erginn008/3e2ce24a277ggh9/e709d1a.json
I'm looking to extract the Erginn008 between the first 2 backslashes?
Any help appreciated thanks.
... View more