Splunk Search

if match eval with an or

jclemons7
Path Finder

Hello,

I'm trying to create an eval statement that evaluates if a string exists OR another string exists. For example, I'd like to say:

if "\cmd.exe" or "\test.exe /switch" then 1 else 0

So I have the following "attempt":

| eval exe_count=if(match(lower(CommandLine),"\cmd.exe" OR "\\\test.exe \\/switch"),1,0)

But it doesn't seem to work.. so I'm wondering what I'm doing wrong..

Thanks in advance.

1 Solution

richgalloway
SplunkTrust
SplunkTrust

Perhaps it was left out from the question, but the first comparator needs to be escaped. Also, the match command expects a single string for its second argument. Try this.

... | eval exe_count=case(match(lower(CommandLine),"\\\cmd.exe"),1, match(lower(CommandLine),"\\\test.exe \/switch"),1, 1=1,0)
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Perhaps it was left out from the question, but the first comparator needs to be escaped. Also, the match command expects a single string for its second argument. Try this.

... | eval exe_count=case(match(lower(CommandLine),"\\\cmd.exe"),1, match(lower(CommandLine),"\\\test.exe \/switch"),1, 1=1,0)
---
If this reply helps you, Karma would be appreciated.

jclemons7
Path Finder

The force is strong with you.. thank you so much for your help, that's exactly what I was looking for.

Get Updates on the Splunk Community!

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...