<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to filter only desired fields from fetched events? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680913#M232708</link>
    <description>&lt;P&gt;if the fileds has values like filed=0, field=1 etc.. how can i filter this filed which has values greater than 1&lt;/P&gt;</description>
    <pubDate>Sat, 16 Mar 2024 17:14:07 GMT</pubDate>
    <dc:creator>Rajpranar</dc:creator>
    <dc:date>2024-03-16T17:14:07Z</dc:date>
    <item>
      <title>how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9306#M68</link>
      <description>&lt;P&gt;In SQL-speak, "how to specify the columns in &lt;CODE&gt;SELECT&lt;/CODE&gt; clause"?  Normally, Splunk does the equivalent of &lt;CODE&gt;SELECT *&lt;/CODE&gt;, which might not be wanted.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2010 09:02:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9306#M68</guid>
      <dc:creator>V_at_Splunk</dc:creator>
      <dc:date>2010-01-18T09:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9307#M69</link>
      <description>&lt;P&gt;Say you want only field &lt;CODE&gt;foo&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;In 3.x, &lt;CODE&gt;... | FIELDS + foo&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;In 4.x, &lt;CODE&gt;... | FIELDS foo | FIELDS - _*&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2010 09:10:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9307#M69</guid>
      <dc:creator>V_at_Splunk</dc:creator>
      <dc:date>2010-01-18T09:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9308#M70</link>
      <description>&lt;P&gt;what does the _* in the 4.x string mean? Why the underscore?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2010 14:50:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9308#M70</guid>
      <dc:creator>benstraw</dc:creator>
      <dc:date>2010-01-18T14:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9309#M71</link>
      <description>&lt;P&gt;_* refers to the reserved (a.k.a. "internal") fields such as _time.&lt;/P&gt;

&lt;P&gt;So it seems to read "I want foo, &lt;EM&gt;and&lt;/EM&gt; I don't want any internal fields".&lt;/P&gt;

&lt;P&gt;The explanation at &lt;A href="http://www.splunk.com/base/Documentation/latest/SearchReference/Fields"&gt;http://www.splunk.com/base/Documentation/latest/SearchReference/Fields&lt;/A&gt; might make more sense to you.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2010 02:15:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/9309#M71</guid>
      <dc:creator>V_at_Splunk</dc:creator>
      <dc:date>2010-01-19T02:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680913#M232708</link>
      <description>&lt;P&gt;if the fileds has values like filed=0, field=1 etc.. how can i filter this filed which has values greater than 1&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2024 17:14:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680913#M232708</guid>
      <dc:creator>Rajpranar</dc:creator>
      <dc:date>2024-03-16T17:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680915#M232709</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265990"&gt;@Rajpranar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is a lovely thread, but it's 14 years old. Asking a new, unanswered question will help you get an answer more quickly.&lt;/P&gt;&lt;P&gt;You can use the greater than operator in field expressions:&lt;/P&gt;&lt;P&gt;field&amp;gt;1&lt;/P&gt;&lt;P&gt;See&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Search/Fieldexpressions" target="_self"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Search/Fieldexpressions&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;If you need to compare the value of two fields, use the where command:&lt;/P&gt;&lt;P&gt;| where field2&amp;gt;field1&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2024 18:07:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680915#M232709</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2024-03-16T18:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter only desired fields from fetched events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680918#M232710</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/49493"&gt;@tscroggins&lt;/a&gt;&amp;nbsp;i did post a new question..&lt;/P&gt;&lt;P&gt;How to filter a field from the log where the values change for example please see below,&lt;/P&gt;&lt;P&gt;logfile =(result1=0 result2=5 result3=10 result4=14)&amp;nbsp; at 5AM&lt;/P&gt;&lt;P&gt;logfile =(result1=8 result2=5 result3=10 result4=14) at 5:10Am&lt;/P&gt;&lt;P&gt;logfile =(result1=4 result2=5 result3=10 result4=14) at 5:20Am&lt;/P&gt;&lt;P&gt;logfile =(result1=3 result2=5 result3=10 result4=14) at 5:30Am&lt;/P&gt;&lt;P&gt;i want query to return result and show when result1 is greater than 5, please help&lt;/P&gt;&lt;P&gt;Current state im at =index=indexname | search sourcetype=eventname "result1=5" gives results but if i do&lt;BR /&gt;index=indexname | search sourcetype=eventname "result1&amp;gt; 4" returns nothing&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2024 19:03:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-filter-only-desired-fields-from-fetched-events/m-p/680918#M232710</guid>
      <dc:creator>Rajpranar</dc:creator>
      <dc:date>2024-03-16T19:03:25Z</dc:date>
    </item>
  </channel>
</rss>

