Hi.. I have in splunk logs comes from different sources.. and different events. For example, one type of events contains user information without server name: Logged-in user {'kind': 'user', 'name': 'XXXXXX', 'admin': False, 'groups': [], 'server': '/jhub-test/user/XXXXXX/', 'pending': None, 'created': '2020-12-27T03:29:41.850432Z', 'last_activity': '2021-01-16T05:18:16.822564Z', 'servers': None} and other have server ip on that.. So I need to construct query were I can select the source based on server ip search and after search the specific action - for example user logon events. so I want to write some query like this: if source=* contain ip address when source="the actual source name which contain ip address" |search "*Logged*"
... View more