<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I search for event with null values in fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49881#M11979</link>
    <description>&lt;P&gt;I downvoted this post because by mistake&lt;/P&gt;</description>
    <pubDate>Tue, 19 Dec 2017 17:20:14 GMT</pubDate>
    <dc:creator>Kwip</dc:creator>
    <dc:date>2017-12-19T17:20:14Z</dc:date>
    <item>
      <title>How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49875#M11973</link>
      <description>&lt;P&gt;I'm trying to find all events in the logs that have no value in a field. What's the simplest query for that?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2011 23:07:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49875#M11973</guid>
      <dc:creator>JChodagam</dc:creator>
      <dc:date>2011-07-27T23:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49876#M11974</link>
      <description>&lt;P&gt;For instance, all events with NULL TicketId can be retrieved by - &lt;/P&gt;

&lt;P&gt;sourcetype=mysql_config NOT TicketId="*"&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2011 23:12:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49876#M11974</guid>
      <dc:creator>JChodagam</dc:creator>
      <dc:date>2011-07-27T23:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49877#M11975</link>
      <description>&lt;P&gt;Is there another way, to search null without "NOT" ?&lt;BR /&gt;
I user Sideview and Pulldowns with "+OR+" Separator... so the output from the pulldown for the underlying search is key="value OR value" I can't use NOT there...&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2013 07:33:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49877#M11975</guid>
      <dc:creator>sbsbb</dc:creator>
      <dc:date>2013-04-25T07:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49878#M11976</link>
      <description>&lt;P&gt;for example if you don't want "value OR value" you can use:&lt;BR /&gt;
key!="value OR value" , the explanation point "bang" does the same function as the NOT&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2013 18:51:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49878#M11976</guid>
      <dc:creator>JoeSco27</dc:creator>
      <dc:date>2013-09-06T18:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49879#M11977</link>
      <description>&lt;P&gt;Hi , &lt;/P&gt;

&lt;P&gt;index =casm_prod source =/opt/siteminder/log/smtracedefault.log sourcetype=smtrace supportcentral | rex "([[^]]&lt;EM&gt;]){10}[(?P[^]]&lt;/EM&gt;)]"   |dedup sso_id    | lookup identity_lookup sso as sso_id  OUTPUT sso as matched_sso  |where matched_sso!="NonNbcAccount"&lt;/P&gt;

&lt;P&gt;This is working good , &lt;/P&gt;

&lt;P&gt;output , &lt;/P&gt;

&lt;P&gt;›&lt;/P&gt;

&lt;P&gt;10/17/14&lt;BR /&gt;
12:04:48.549 PM&lt;BR /&gt;
example 1&lt;/P&gt;

&lt;P&gt;[10/17/2014][09:04:48.549][1041173424][s1206273/r789][Supportcentral Internal][][][][][][127004108][][][][][][supportcentralalpcispweb536vprd][** Status: Authorized. ][]&lt;BR /&gt;
host =useclpapl894.nbcuni.ge.com&lt;BR /&gt;
matched_sso =127004108&lt;BR /&gt;
source =/opt/siteminder/log/smtracedefault.log&lt;BR /&gt;
sourcetype =smtrace&lt;BR /&gt;
sso_id =127004108&lt;/P&gt;

&lt;P&gt;example 1 is correct ..&lt;/P&gt;

&lt;P&gt;›&lt;/P&gt;

&lt;P&gt;10/17/14&lt;BR /&gt;
12:04:48.547 PM&lt;/P&gt;

&lt;P&gt;example 2 ,&lt;/P&gt;

&lt;P&gt;[10/17/2014][09:04:48.547][1041173424][][][SupportCentral allow access][NBCU SC_Lib_Allow_Policy][][][][][][][][][][][Policy is applicable. Rule is applicable. Get Responses.][]&lt;BR /&gt;
host =useclpapl894.nbcuni.ge.com&lt;BR /&gt;
matched_sso ="NonNbcAccount"&lt;BR /&gt;
source =/opt/siteminder/log/smtracedefault.log&lt;BR /&gt;
sourcetype =smtrace&lt;BR /&gt;
sso_id =&lt;BR /&gt;&lt;BR /&gt;
in example 2 is having null value , the 11th field is null [] ... but it is returning that value also ... &lt;/P&gt;

&lt;P&gt;actually i dont want null value ..&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:54:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49879#M11977</guid>
      <dc:creator>siraj198204</dc:creator>
      <dc:date>2020-09-28T17:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49880#M11978</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;i added | where len(sso_id)&amp;gt;0  this search with the above search ...&lt;/P&gt;

&lt;P&gt;it is looks good ... working very good ...&lt;/P&gt;

&lt;P&gt;Thank u ...&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 17:10:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49880#M11978</guid>
      <dc:creator>siraj198204</dc:creator>
      <dc:date>2014-10-17T17:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I search for event with null values in fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49881#M11979</link>
      <description>&lt;P&gt;I downvoted this post because by mistake&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 17:20:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-search-for-event-with-null-values-in-fields/m-p/49881#M11979</guid>
      <dc:creator>Kwip</dc:creator>
      <dc:date>2017-12-19T17:20:14Z</dc:date>
    </item>
  </channel>
</rss>

