<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I filter out results of a search AFTER the search? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242142#M72041</link>
    <description>&lt;P&gt;Your first solution doesn't work too.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Aug 2016 08:56:24 GMT</pubDate>
    <dc:creator>ZacEsa</dc:creator>
    <dc:date>2016-08-22T08:56:24Z</dc:date>
    <item>
      <title>How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242137#M72036</link>
      <description>&lt;P&gt;Basically I have a search from multiple different sources with lots of raw rex field extractions and transactions and evals. Is it possible to filter out the results after all of those?&lt;/P&gt;

&lt;P&gt;E.g. Only show results which fulfil ANY of the below criteria;&lt;/P&gt;

&lt;P&gt;If eventcount&amp;gt;2 AND field1=somevaluehere&lt;BR /&gt;
OR If eventcount&amp;gt;5 AND field1=anothervaluehere&lt;BR /&gt;
OR If field2!=null()&lt;/P&gt;

&lt;P&gt;I'm wondering if this can be done after all the search, rex, transaction, eval and all.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 03:27:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242137#M72036</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-22T03:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242138#M72037</link>
      <description>&lt;P&gt;You should be able to do it with the &lt;CODE&gt;| where&lt;/CODE&gt; command after your complex query, something like &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| where (If eventcount&amp;gt;2 AND field1=somevaluehere) OR ....
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Aug 2016 03:39:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242138#M72037</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2016-08-22T03:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242139#M72038</link>
      <description>&lt;P&gt;Sure you can. Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search | search (eventcount&amp;gt;2 AND field1=somevaluehere) OR (eventcount&amp;gt;5 AND field1=anothervaluehere) OR NOT (field2=*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;*&lt;STRONG&gt;&lt;EM&gt;OR&lt;/EM&gt;&lt;/STRONG&gt;*&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search | where (eventcount&amp;gt;2 AND field1=somevaluehere) OR (eventcount&amp;gt;5 AND field1=anothervaluehere) OR NOT (field2=*)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Aug 2016 03:43:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242139#M72038</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-08-22T03:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242140#M72039</link>
      <description>&lt;P&gt;Strangely, &lt;CODE&gt;where&lt;/CODE&gt; doesn't work for me.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 06:11:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242140#M72039</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-22T06:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242141#M72040</link>
      <description>&lt;P&gt;Strangely, &lt;CODE&gt;where&lt;/CODE&gt; doesn't work for me.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 06:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242141#M72040</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-22T06:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242142#M72041</link>
      <description>&lt;P&gt;Your first solution doesn't work too.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 08:56:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242142#M72041</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-22T08:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242143#M72042</link>
      <description>&lt;P&gt;Do you have a field called eventcount or is that field something you first need Splunk to calculate? The process both folks have provided (where or search) do work. The only difference might be &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search | &amp;lt;your transforming &amp;amp; field extracting commands&amp;gt; | where blah blah blah
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Aug 2016 11:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242143#M72042</guid>
      <dc:creator>Runals</dc:creator>
      <dc:date>2016-08-22T11:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242144#M72043</link>
      <description>&lt;P&gt;If you are using transaction, you will have to use mv functions for field1 &amp;amp; field 2. So try something like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; your base search | where (eventcount&amp;gt;2 AND mvfind(field1, somevaluehere)&amp;gt;=0) OR (eventcount&amp;gt;5 AND mvfind(field2, anothervalue)&amp;gt;=0) ) OR NOT (mvcount(field2)&amp;gt;0)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Aug 2016 13:05:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242144#M72043</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-08-22T13:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242145#M72044</link>
      <description>&lt;P&gt;When you do a transaction, it becomes eventcount. I have no idea why neither works for me. Does where not work for fields extracted by rex? Also, I get this error when trying to run the suggestion after yours(see below comment.)&lt;/P&gt;

&lt;P&gt;Error in 'where' command: Typechecking failed. 'AND' only takes boolean arguments.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 01:16:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242145#M72044</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-23T01:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242146#M72045</link>
      <description>&lt;P&gt;I get the error below when I try to run &lt;CODE&gt;where (eventcount&amp;gt;2 AND mvfind(field1, somevaluehere))&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Error in 'where' command: Typechecking failed. 'AND' only takes boolean arguments.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 01:17:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242146#M72045</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-23T01:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242147#M72046</link>
      <description>&lt;P&gt;I believe one of my issue for where is that I have a concatenated field called rules. And the field doesn't use null() but instead, uses "" as when I use null(), the fields do not concatenate. So, where I try to use &lt;CODE&gt;where rules!=""&lt;/CODE&gt;, it doesn't work.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 01:29:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242147#M72046</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-23T01:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242148#M72047</link>
      <description>&lt;P&gt;This is the where segment&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| where (eventcount&amp;gt;2 AND mvfind(field1, somevaluehere)&amp;gt;=0) OR (eventcount&amp;gt;5 AND mvfind(field2, anothervalue)&amp;gt;=0) ) OR NOT (mvcount(field2)&amp;gt;0)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 01:58:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242148#M72047</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-08-23T01:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do I filter out results of a search AFTER the search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242149#M72048</link>
      <description>&lt;P&gt;I've got it to start working but, I'm having a peculiar issue. When I use &lt;CODE&gt;where ((acduser!="user1" OR acduser!="user2") AND rules="After Office Hours")&lt;/CODE&gt; it's still showing events which are "After Office Hours" AND if user is user1 or user2. From the above where, shouldn't it show "After Office Hours" if user is NOT user1 or user2?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 04:19:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-filter-out-results-of-a-search-AFTER-the-search/m-p/242149#M72048</guid>
      <dc:creator>ZacEsa</dc:creator>
      <dc:date>2016-08-25T04:19:31Z</dc:date>
    </item>
  </channel>
</rss>

