Skip to content

Commit 467ba9f

Browse files
fix: field validation condition (#921)
Fixes the issue with validation condition being used while executing SPL query to search events for particular testcase. Reference issue: https://github.com/splunk/splunk-add-on-for-unix-and-linux/runs/49911799683 Test run: https://github.com/splunk/splunk-add-on-for-unix-and-linux/actions/runs/17581963680
1 parent e13a6ea commit 467ba9f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

pytest_splunk_addon/data_models/Endpoint.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@
8888
{
8989
"name": "transport_dest_port",
9090
"type": "required",
91-
"validity": "(?:tcp|udp|dccp|sctp)\\/(?:(6553[0-5]|655[0-2][0-9]|65[0-4][0-9]{2}|6[0-4][0-9]{3}|[1-5][0-9]{4}|[0-9]{1,4})$)",
91+
"validity": "if(match(transport_dest_port, \"(?:tcp|udp|dccp|sctp)\\/(?:(6553[0-5]|655[0-2][0-9]|65[0-4][0-9]{2}|6[0-4][0-9]{3}|[1-5][0-9]{4}|[0-9]{1,4})$)\"), transport_dest_port, null())",
9292
"comment": "Calculated as transport/dest_port, such as tcp/53."
9393
},
9494
{

0 commit comments

Comments
 (0)