I tried this way but I didn't receive any result. I am a newbie in Splunk 😞 What do you think about this way?: I can search all events with a successful update using regex search source="WinEventLog:System" | regex Message = "KB5555555" and for example i receive a few events from two hosts. First question: How I can create a table with a list of these hosts? As I guess, then I can't use a search like "source="WinEventLog:System" | regex not Message = "KB5555555"" to find all hosts without this update because this search won't show any events. I'm stumped 😞
... View more