<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log filtering based on field value change. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360628#M106584</link>
    <description>&lt;P&gt;Hi rakes568&lt;BR /&gt;
try something like this:&lt;BR /&gt;
sourcetype = abc (status=active OR status=inactive)&lt;BR /&gt;
| transaction IP&lt;BR /&gt;
| search NOT status=inactive&lt;BR /&gt;
| table IP&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Wed, 03 May 2017 13:28:03 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2017-05-03T13:28:03Z</dc:date>
    <item>
      <title>Log filtering based on field value change.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360625#M106581</link>
      <description>&lt;P&gt;I have two kinds of logs &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype = abc IP = a.b.c.d status=active
sourcetype = abc IP = a.b.c.e status=active
sourcetype = abc IP = a.b.c.f status=active
sourcetype = abc IP = x.x.x.x status=inactive
sourcetype = abc IP = a.b.c.d status=inactive
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I want to get a list of IP with status=active, but IP with whose status has changed to inactive should get filtered out.&lt;/P&gt;

&lt;P&gt;Like in the example output should be:&lt;BR /&gt;
a.b.c.e&lt;BR /&gt;
a.b.c.f&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 12:56:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360625#M106581</guid>
      <dc:creator>rakes568</dc:creator>
      <dc:date>2017-05-03T12:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Log filtering based on field value change.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360626#M106582</link>
      <description>&lt;P&gt;Try this.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; sourcetype = abc | dedup IP | where status="active"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 03 May 2017 13:04:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360626#M106582</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2017-05-03T13:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Log filtering based on field value change.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360627#M106583</link>
      <description>&lt;P&gt;You can try the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;YourBaseSearch&amp;gt; sourcetype="abc" IP=* status="active" OR status="inactive"
| stats dc(status) as StatusCount values(status) as status by IP
| search status="active" AND status!="inactive"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 03 May 2017 13:20:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360627#M106583</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-05-03T13:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Log filtering based on field value change.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360628#M106584</link>
      <description>&lt;P&gt;Hi rakes568&lt;BR /&gt;
try something like this:&lt;BR /&gt;
sourcetype = abc (status=active OR status=inactive)&lt;BR /&gt;
| transaction IP&lt;BR /&gt;
| search NOT status=inactive&lt;BR /&gt;
| table IP&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:28:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Log-filtering-based-on-field-value-change/m-p/360628#M106584</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-05-03T13:28:03Z</dc:date>
    </item>
  </channel>
</rss>

