<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to show only events that are not Closed in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711879#M240247</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;That is awesome, by removing:&lt;/P&gt;&lt;P&gt;table alert.message,&amp;nbsp;&lt;/P&gt;&lt;P&gt;And adding the "by alert.id". only the events that are created with no close appear as expected.&amp;nbsp; Thank you for that.&amp;nbsp; The last piece of the puzzle is how can I create a table that contains other fields that aren't in the "stats" command?&lt;BR /&gt;&lt;BR /&gt;If I add a field from the source, nothing is returned.&amp;nbsp; Here's the full working "Search" you helped me with, it includes the field entity.source, where nothing is returned.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=healthcheck integrationName="Opsgenie Edge Connector - Splunk" alert.message = "STORE*" "entity.source"=Meraki, action IN ("Create","Close") 
| eval Create=IF(action=="Create",1,0)
| eval Close=IF(action=="Close",1,0)
| stats earliest(_time) as start_time, latest(_time) as end_time, sum(Create) as isCreate, sum(Close) as isClose by alert.id, alert.message
| where isClose=0
| table entity.source, alert.id, alert.message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk-Search.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34605i37197C65B496F2AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Splunk-Search.png" alt="Splunk-Search.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I wish I could give you 20 kudos.&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Feb 2025 16:20:35 GMT</pubDate>
    <dc:creator>tdavison76</dc:creator>
    <dc:date>2025-02-17T16:20:35Z</dc:date>
    <item>
      <title>How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711852#M240233</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I really appreciate any help on this one, I can't figure it out.&amp;nbsp; I am using the following to show only the "Create" events that don't have a corresponding "Close" event.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| transaction "alert.id", alert.message startswith=Create endswith=Close keepevicted=true
| where closed_txn=0&lt;/LI-CODE&gt;&lt;P&gt;This works, but, the search is running for "All Time", and we only keep events up to 1 yr.&amp;nbsp; I've ran into the issue of once one of the "Create" events reach that 1 yr and is deleted.&amp;nbsp; The "Close" event will make it appear in the Search results.&lt;BR /&gt;&lt;BR /&gt;I'm not sure why a "Close" event without a corresponding "Create" event would be counted, or how I can prevent if a single "Create" or "Close" event from being returned once one of the events have been deleted or is beyond the Search time frame selected.&lt;/P&gt;&lt;P&gt;Any ideas on this one? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help, you will save me some sleepless nights.&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 13:06:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711852#M240233</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T13:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711855#M240236</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267744"&gt;@tdavison76&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you might be able to achieve this by adding an '&lt;STRONG&gt;AND _time &amp;lt;= relative_time(now(), "-1y@y")&lt;/STRONG&gt;' to your search (adjusting the data accordingly) so that you ignore old events where the created event is missing because it has aged out.&lt;!--  notionvc: a4eb42de-bb2d-43a1-8b76-b580b2529ddf  --&gt;&lt;/P&gt;&lt;P&gt;I would also look to change your search to not use the transaction command, which is very resource intensive and has limitations, instead you could use/adapt the following to get similar outputs:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=YourIndex earliest=-1y latest=now alert.message IN ("Create","Close") 
| eval {alert.message}=1
``` or use | eval Create=IF(alert.message=="Create",1,0) Close=IF(alert.message=="Close",1,0) ```
| stats earliest(_time) as start_time, latest(_time) as end_time, sum(Create) as isCreate, sum(Close) as isClose
| where isClose=0&lt;/LI-CODE&gt;&lt;P&gt;Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 13:29:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711855#M240236</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-02-17T13:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711856#M240237</link>
      <description>&lt;P&gt;Try to avoid using the transaction command because it's very non-performant.&amp;nbsp; Try this, instead.&amp;nbsp; Search for all Create and Close events then keep only the most recent for each alert.id/alert.message pair.&amp;nbsp; Throw out the Close events and what's left will be Creates without a Close.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=foo ("Create" OR "Close")
```Select the most recent event for each id/message ```
| dedup alert.id alert.message
```Discard the Close events```
| where NOT "Close"&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 17 Feb 2025 13:41:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711856#M240237</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2025-02-17T13:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711859#M240239</link>
      <description>&lt;P&gt;Thank you so much for the details, I gave it a shot, but it produced the following error:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Error in 'where' command: Type checking failed. 'XOR' only takes boolean arguments.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the full search I am doing:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=healthcheck ("Create" OR "Close") integrationName="Opsgenie Edge Connector - Splunk" alert.message = "STORE*"
| dedup alert.id alert.message
| where NOT "Close"
| table alert.message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas what I am doing wrong? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 13:49:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711859#M240239</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T13:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711861#M240241</link>
      <description>&lt;P&gt;Thank you very much for your help,&lt;/P&gt;&lt;P&gt;I gave it a shot with the:&lt;/P&gt;&lt;P&gt;eval {alert.message}=1&lt;/P&gt;&lt;P&gt;But, didn't get any results back,&amp;nbsp; I then tried with the:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval Create=IF(alert.message=="Create",1,0) Close=IF(alert.message=="Close",1,0)  | stats earliest(_time) as start_time, latest(_time) as end_time, sum(Create) as isCreate, sum(Close) as isClose | where isClose=0&lt;/LI-CODE&gt;&lt;P&gt;and got back a:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error in 'EvalCommand': The expression is malformed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I really suck at this&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for the help,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tom&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:08:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711861#M240241</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T14:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711863#M240242</link>
      <description>&lt;P&gt;I didn't make it clear, but my example code is more pseudo-code than pure SPL, since I don't know exactly what to look for to locate "Close" or "Create" messages.&amp;nbsp; However, you should be able to fix your problem by replacing &lt;FONT face="courier new,courier"&gt;where&lt;/FONT&gt; with &lt;FONT face="courier new,courier"&gt;search&lt;/FONT&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:19:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711863#M240242</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2025-02-17T14:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711865#M240243</link>
      <description>&lt;P&gt;Thanks again Rich,&lt;/P&gt;&lt;P&gt;Changing it to "search" got me past the error. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; Sorry, I didn't give all the details, I found out the "Create" "Close" is in the "action" field.&amp;nbsp; So an example event is:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{"actionType": "custom", "customerId": "3a1f4387-b87b-4a3a-a568-cc372a86d8e4", "ownerDomain": "integration", "ownerId": "2196f43b-7e43-49dd-b8b7-8243aa391ad9", "discardScriptResponse": true, "sendCallbackToStreamHub": false, "requestId": "dc4c0970-e1fa-492a-999b-10979478d980", "action": "Create", "productSource": "Opsgenie", "customerDomain": "siteone", "integrationName": "Opsgenie Edge Connector - Splunk", "integrationId": "2196f43b-7e43-49dd-b8b7-8243aa391ad9", "customerTransitioningOrConsolidated": false, "source": {"name": "Meraki", "type": "Zapier"}, "type": "oec", "receivedAt": 1739802456801, "params": {"type": "oec", "alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "customerId": "3a1f4387-b87b-4a3a-a568-cc372a86d8e4", "action": "Create", "integrationId": "2196f43b-7e43-49dd-b8b7-8243aa391ad9", "integrationName": "Opsgenie Edge Connector - Splunk", "integrationType": "OEC", "customerDomain": "siteone", "alertDetails": {}, "alertAlias": "STORE_674_BOXONE_MX_674", "receivedAt": 1739802456801, "customerConsolidated": false, "customerTransitioningOrConsolidated": false, "productSource": "Opsgenie", "source": {"name": "Meraki", "type": "Zapier"}, "alert": {"alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "id": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "type": "alert", "message": "STORE_674_BOXONE - MX_674 - WAN Packet Loss", "tags": [], "tinyId": "52615", "entity": "{\"alertConfigId\":636696397319904332,\"configType\":\"AlertConfigs::MiWanPacketLossConfig\",\"condition\":{\"type\":\"wanPacketLoss\",\"window\":600,\"duration\":300,\"interface\":\"wan1\",\"lossRatio\":0.3},\"networkId\":636696397319556753,\"nodeId\":48649290476856,\"status\":\"on\",\"recipients\":{\"emails\":[],\"httpServerIds\":[\"aHR0cHM6Ly9wcm9kLTkxLndlc3R1cy5sb2dpYy5henVyZS5jb206NDQzL3dvcmtmbG93cy9iOTM1ZjU5ODZkMmQ0Njg0YTVjYzUxNGQ2NmNmYmU0OS90cmlnZ2Vycy9tYW51YWwvcGF0aHMvaW52b2tlP2FwaS12ZXJzaW9uPTIwMTYtMDYtMDEmc3A9L3RyaWdnZXJzL21hbnVhbC9y", "alias": "STORE_674_BOXONE_MX_674", "createdAt": 1739802456706, "updatedAt": 1739802457456000000, "username": "Alert API", "team": "Network Support", "responders": [{"id": "830235c6-2402-4c11-9e10-eca616e83acf", "type": "team", "name": "Network Support"}], "teams": ["830235c6-2402-4c11-9e10-eca616e83acf"], "actions": [], "priority": "P2", "source": "Meraki"}, "entity": {"alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "id": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "type": "alert", "message": "STORE_674_BOXONE - MX_674 - WAN Packet Loss", "tags": [], "tinyId": "52615", "entity": "{\"alertConfigId\":636696397319904332,\"configType\":\"AlertConfigs::MiWanPacketLossConfig\",\"condition\":{\"type\":\"wanPacketLoss\",\"window\":600,\"duration\":300,\"interface\":\"wan1\",\"lossRatio\":0.3},\"networkId\":636696397319556753,\"nodeId\":48649290476856,\"status\":\"on\",\"recipients\":{\"emails\":[],\"httpServerIds\":[\"aHR0cHM6Ly9wcm9kLTkxLndlc3R1cy5sb2dpYy5henVyZS5jb206NDQzL3dvcmtmbG93cy9iOTM1ZjU5ODZkMmQ0Njg0YTVjYzUxNGQ2NmNmYmU0OS90cmlnZ2Vycy9tYW51YWwvcGF0aHMvaW52b2tlP2FwaS12ZXJzaW9uPTIwMTYtMDYtMDEmc3A9L3RyaWdnZXJzL21hbnVhbC9y", "alias": "STORE_674_BOXONE_MX_674", "createdAt": 1739802456706, "updatedAt": 1739802457456000000, "username": "Alert API", "team": "Network Support", "responders": [{"id": "830235c6-2402-4c11-9e10-eca616e83acf", "type": "team", "name": "Network Support"}], "teams": ["830235c6-2402-4c11-9e10-eca616e83acf"], "actions": [], "priority": "P2", "source": "Meraki"}, "mappedActionDto": {"mappedAction": "postActionToOEC", "extraField": ""}, "ownerId": "2196f43b-7e43-49dd-b8b7-8243aa391ad9"}, "integrationType": "OEC", "alert": {"alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "id": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "type": "alert", "message": "STORE_674_BOXONE - MX_674 - WAN Packet Loss", "tags": [], "tinyId": "52615", "entity": "{\"alertConfigId\":636696397319904332,\"configType\":\"AlertConfigs::MiWanPacketLossConfig\",\"condition\":{\"type\":\"wanPacketLoss\",\"window\":600,\"duration\":300,\"interface\":\"wan1\",\"lossRatio\":0.3},\"networkId\":636696397319556753,\"nodeId\":48649290476856,\"status\":\"on\",\"recipients\":{\"emails\":[],\"httpServerIds\":[\"aHR0cHM6Ly9wcm9kLTkxLndlc3R1cy5sb2dpYy5henVyZS5jb206NDQzL3dvcmtmbG93cy9iOTM1ZjU5ODZkMmQ0Njg0YTVjYzUxNGQ2NmNmYmU0OS90cmlnZ2Vycy9tYW51YWwvcGF0aHMvaW52b2tlP2FwaS12ZXJzaW9uPTIwMTYtMDYtMDEmc3A9L3RyaWdnZXJzL21hbnVhbC9y", "alias": "STORE_674_BOXONE_MX_674", "createdAt": 1739802456706, "updatedAt": 1739802457456000000, "username": "Alert API", "team": "Network Support", "responders": [{"id": "830235c6-2402-4c11-9e10-eca616e83acf", "type": "team", "name": "Network Support"}], "teams": ["830235c6-2402-4c11-9e10-eca616e83acf"], "actions": [], "priority": "P2", "source": "Meraki"}, "customerConsolidated": false, "mappedActionDto": {"mappedAction": "postActionToOEC", "extraField": ""}, "alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "alertAlias": "STORE_674_BOXONE_MX_674", "alertDetails": {}, "entity": {"alertId": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "id": "af912c6d-fabd-4df5-ab5b-1669d0908518-1739802456706", "type": "alert", "message": "STORE_674_BOXONE - MX_674 - WAN Packet Loss", "tags": [], "tinyId": "52615", "entity": "{\"alertConfigId\":636696397319904332,\"configType\":\"AlertConfigs::MiWanPacketLossConfig\",\"condition\":{\"type\":\"wanPacketLoss\",\"window\":600,\"duration\":300,\"interface\":\"wan1\",\"lossRatio\":0.3},\"networkId\":636696397319556753,\"nodeId\":48649290476856,\"status\":\"on\",\"recipients\":{\"emails\":[],\"httpServerIds\":[\"aHR0cHM6Ly9wcm9kLTkxLndlc3R1cy5sb2dpYy5henVyZS5jb206NDQzL3dvcmtmbG93cy9iOTM1ZjU5ODZkMmQ0Njg0YTVjYzUxNGQ2NmNmYmU0OS90cmlnZ2Vycy9tYW51YWwvcGF0aHMvaW52b2tlP2FwaS12ZXJzaW9uPTIwMTYtMDYtMDEmc3A9L3RyaWdnZXJzL21hbnVhbC9y", "alias": "STORE_674_BOXONE_MX_674", "createdAt": 1739802456706, "updatedAt": 1739802457456000000, "username": "Alert API", "team": "Network Support", "responders": [{"id": "830235c6-2402-4c11-9e10-eca616e83acf", "type": "team", "name": "Network Support"}], "teams": ["830235c6-2402-4c11-9e10-eca616e83acf"], "actions": [], "priority": "P2", "source": "Meraki"}}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run the following Search, it gives me every event that has an action of "Create", but I need it to return only the "Create" that doesn't have a corresponding "Close".&amp;nbsp; &amp;nbsp;The alert.id would be unique with each Create and Close event.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=healthcheck ("Create","Close") integrationName="Opsgenie Edge Connector - Splunk" alert.message = "STORE*" 
| dedup alert.id, action
| search NOT "Close"
| table alert.message&lt;/LI-CODE&gt;&lt;P&gt;Really appreciate the help, going crazy trying to figure this one out &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:38:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711865#M240243</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T14:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711868#M240245</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Sorry, I found out the "Create" and "Close" is in the "action" field.&amp;nbsp; I ran the following Search and it for some reason I get 0 results in the table, and all Create and Close events are returned.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=healthcheck integrationName="Opsgenie Edge Connector - Splunk" alert.message = "STORE*" "entity.source"=Meraki, action IN ("Create","Close") 
| eval Create=IF(action=="Create",1,0)
| eval Close=IF(action=="Close",1,0)
| stats earliest(_time) as start_time, latest(_time) as end_time, sum(Create) as isCreate, sum(Close) as isClose
| where isClose=0
| table alert.message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the confusion, and thank you very much for the help.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 14:55:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711868#M240245</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T14:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711874#M240246</link>
      <description>&lt;P&gt;What happens if you remove the SPL after and including the "where"?&lt;BR /&gt;I also realised I'm missing the BY statement on the end of the stats command (BY alert.id) - presumably?&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 15:17:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711874#M240246</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-02-17T15:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711879#M240247</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;That is awesome, by removing:&lt;/P&gt;&lt;P&gt;table alert.message,&amp;nbsp;&lt;/P&gt;&lt;P&gt;And adding the "by alert.id". only the events that are created with no close appear as expected.&amp;nbsp; Thank you for that.&amp;nbsp; The last piece of the puzzle is how can I create a table that contains other fields that aren't in the "stats" command?&lt;BR /&gt;&lt;BR /&gt;If I add a field from the source, nothing is returned.&amp;nbsp; Here's the full working "Search" you helped me with, it includes the field entity.source, where nothing is returned.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=healthcheck integrationName="Opsgenie Edge Connector - Splunk" alert.message = "STORE*" "entity.source"=Meraki, action IN ("Create","Close") 
| eval Create=IF(action=="Create",1,0)
| eval Close=IF(action=="Close",1,0)
| stats earliest(_time) as start_time, latest(_time) as end_time, sum(Create) as isCreate, sum(Close) as isClose by alert.id, alert.message
| where isClose=0
| table entity.source, alert.id, alert.message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk-Search.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34605i37197C65B496F2AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Splunk-Search.png" alt="Splunk-Search.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I wish I could give you 20 kudos.&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 16:20:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711879#M240247</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T16:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to show only events that are not Closed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711881#M240249</link>
      <description>&lt;P&gt;Thanks, I figured it out with your help.&amp;nbsp; Very much appreciated, and I hope you have a great day.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 17:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-show-only-events-that-are-not-Closed/m-p/711881#M240249</guid>
      <dc:creator>tdavison76</dc:creator>
      <dc:date>2025-02-17T17:25:20Z</dc:date>
    </item>
  </channel>
</rss>

