The equivalent to running host= * DHCP * in Splunk.
IF the data contains a host
field, you can use the match method:
host.match(/dhcp/i)
If the host name is in the _raw
string, sub _raw
for host
in the above.
2 UpGoats