<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter a field from the log where the values change in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680919#M232896</link>
    <description>&lt;P&gt;I recommend using the "where" command:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=indexname sourcetype=eventname
| where result1 &amp;gt; 5&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;(note this assumes that result1 is already an extracted field. If not, try this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=indexname sourcetype=eventname
| rex field=_raw "result1=(?&amp;lt;result1&amp;gt;\d*)"
| where result1 &amp;gt; 5&lt;/LI-CODE&gt;</description>
    <pubDate>Sat, 16 Mar 2024 20:19:28 GMT</pubDate>
    <dc:creator>marnall</dc:creator>
    <dc:date>2024-03-16T20:19:28Z</dc:date>
    <item>
      <title>How to filter a field from the log where the values change</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680914#M232895</link>
      <description>&lt;P&gt;How to filter a field from the log where the values change for example please see below,&lt;/P&gt;&lt;P&gt;logfile =(result1=0 result2=5 result3=10 result4=14)&amp;nbsp; at 5AM&lt;/P&gt;&lt;P&gt;logfile =(result1=8 result2=5 result3=10 result4=14) at 5:10Am&lt;/P&gt;&lt;P&gt;logfile =(result1=4 result2=5 result3=10 result4=14) at 5:20Am&lt;/P&gt;&lt;P&gt;logfile =(result1=3 result2=5 result3=10 result4=14) at 5:30Am&lt;/P&gt;&lt;P&gt;i want query to return result and show when result1 is greater than 5, please help&lt;/P&gt;&lt;P&gt;Current state im at =index=indexname | search sourcetype=eventname "result1=5" gives results but if i do&lt;BR /&gt;index=indexname | search sourcetype=eventname "result1&amp;gt; 5" returns nothing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2024 17:45:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680914#M232895</guid>
      <dc:creator>Rajpranar</dc:creator>
      <dc:date>2024-03-16T17:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a field from the log where the values change</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680919#M232896</link>
      <description>&lt;P&gt;I recommend using the "where" command:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=indexname sourcetype=eventname
| where result1 &amp;gt; 5&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;(note this assumes that result1 is already an extracted field. If not, try this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=indexname sourcetype=eventname
| rex field=_raw "result1=(?&amp;lt;result1&amp;gt;\d*)"
| where result1 &amp;gt; 5&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 16 Mar 2024 20:19:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680919#M232896</guid>
      <dc:creator>marnall</dc:creator>
      <dc:date>2024-03-16T20:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a field from the log where the values change</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680928#M232897</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/263556"&gt;@marnall&lt;/a&gt;&amp;nbsp;this worked perfectly.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2024 23:54:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-a-field-from-the-log-where-the-values-change/m-p/680928#M232897</guid>
      <dc:creator>Rajpranar</dc:creator>
      <dc:date>2024-03-16T23:54:23Z</dc:date>
    </item>
  </channel>
</rss>

