<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: extracting events based on certain conditions in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448856#M191225</link>
    <description>&lt;P&gt;hi @bhavneeshvohra  as @jpolvino says, this is a tricky one.&lt;BR /&gt;
You can always have a search query as the first query without displaying it and calculate violationstatus into a token under   tag&lt;BR /&gt;
BUT&lt;BR /&gt;
what is your first 50 rows? Is it the default 'latest first' way that splunk shows events or is the earliest event , event #1.&lt;BR /&gt;
Once you provide us that, the rest can be done in the manner I suggested above&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2019 16:33:49 GMT</pubDate>
    <dc:creator>Sukisen1981</dc:creator>
    <dc:date>2019-08-13T16:33:49Z</dc:date>
    <item>
      <title>extracting events based on certain conditions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448853#M191222</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;

&lt;P&gt;I am stuck in a scenario which has multiple conditions and i am unable to resolve it. Kindly Help!!!&lt;/P&gt;

&lt;P&gt;I have data as follows:-&lt;BR /&gt;
    vin, cid, violationstatus,&lt;BR /&gt;
   abc,45,45&lt;BR /&gt;
   def ,56,76&lt;/P&gt;

&lt;P&gt;i want that if violationstatus&amp;lt;50 records 1-50 should be considered for dashboard generation&lt;BR /&gt;
if   violationstatus&amp;gt;50  records 50-100 should be considered for dashboard generation&lt;/P&gt;

&lt;P&gt;HOw to do it please help.?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 07:34:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448853#M191222</guid>
      <dc:creator>bhavneeshvohra</dc:creator>
      <dc:date>2019-08-13T07:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: extracting events based on certain conditions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448854#M191223</link>
      <description>&lt;P&gt;***&lt;STRONG&gt;&lt;EM&gt;edit&lt;/EM&gt;&lt;/STRONG&gt;*********&lt;/P&gt;

&lt;P&gt;i want that if violationstatus is lessthan 50 records 1-50 should be considered for dashboard generation&lt;BR /&gt;
i want that if violationstatus is greater than 50 records 50-100 should be considered for dashboard generation&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 07:35:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448854#M191223</guid>
      <dc:creator>bhavneeshvohra</dc:creator>
      <dc:date>2019-08-13T07:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: extracting events based on certain conditions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448855#M191224</link>
      <description>&lt;P&gt;If the condition violationstatus&amp;lt;50 then how do you know which records represent 1-50? Are they numbered or otherwise labeled?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 12:11:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448855#M191224</guid>
      <dc:creator>jpolvino</dc:creator>
      <dc:date>2019-08-13T12:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: extracting events based on certain conditions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448856#M191225</link>
      <description>&lt;P&gt;hi @bhavneeshvohra  as @jpolvino says, this is a tricky one.&lt;BR /&gt;
You can always have a search query as the first query without displaying it and calculate violationstatus into a token under   tag&lt;BR /&gt;
BUT&lt;BR /&gt;
what is your first 50 rows? Is it the default 'latest first' way that splunk shows events or is the earliest event , event #1.&lt;BR /&gt;
Once you provide us that, the rest can be done in the manner I suggested above&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 16:33:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-events-based-on-certain-conditions/m-p/448856#M191225</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2019-08-13T16:33:49Z</dc:date>
    </item>
  </channel>
</rss>

