<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I show the fields which have a specific value? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327143#M97444</link>
    <description>&lt;P&gt;Perfect - I'll do so...&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2017 17:18:18 GMT</pubDate>
    <dc:creator>ddrillic</dc:creator>
    <dc:date>2017-04-13T17:18:18Z</dc:date>
    <item>
      <title>How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327137#M97438</link>
      <description>&lt;P&gt;I'm running the following - &lt;CODE&gt;index=&amp;lt;claims_index&amp;gt; geico | table *&lt;/CODE&gt;. This index has around 200 fields and I would like the query to show only the fields which have &lt;CODE&gt;geico&lt;/CODE&gt; in them. Is it possible?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 14:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327137#M97438</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-04-13T14:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327138#M97439</link>
      <description>&lt;P&gt;Try this workaround.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;claims_index&amp;gt; geico | eval temp=_time | fields - _* | eval _time=temp | fields - temp| table _time *
| untable _time fieldname fieldvalue | where match(fieldvalue,"geico") | xyseries _time fieldname fieldvalue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 13 Apr 2017 14:37:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327138#M97439</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-04-13T14:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327139#M97440</link>
      <description>&lt;P&gt;Not sure if I can grasp it ; -) &lt;/P&gt;

&lt;P&gt;Formatted a bit - &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;claims_index&amp;gt; geico 
| eval temp=_time 
| fields - _* 
| eval _time=temp 
| fields - temp
| table _time *
| untable _time fieldname fieldvalue 
| where match(fieldvalue,"geico") 
| xyseries _time fieldname fieldvalue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This &lt;CODE&gt;claims_index&lt;/CODE&gt; is huge and since we search explicitly for &lt;CODE&gt;geico&lt;/CODE&gt;, the query is very slow. Is there a way to see intermediate results? It can run for many hours...&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 15:14:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327139#M97440</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-04-13T15:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327140#M97441</link>
      <description>&lt;P&gt;There are some element in the query to clean fields (remove all &lt;CODE&gt;_&lt;/CODE&gt; fields but preserve _time), so looks weird. &lt;/P&gt;

&lt;P&gt;YOu can reduce the time range and/or add a &lt;CODE&gt;head&lt;/CODE&gt; command after the base search to process only few rows for testing. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;claims_index&amp;gt; geico  | head 1000
 | eval temp=_time 
 | fields - _* 
 | eval _time=temp 
 | fields - temp
 | table _time *
 | untable _time fieldname fieldvalue 
 | where match(fieldvalue,"geico") 
 | xyseries _time fieldname fieldvalue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 13 Apr 2017 15:22:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327140#M97441</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-04-13T15:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327141#M97442</link>
      <description>&lt;P&gt;So, I ran the following -&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;claims_index&amp;gt;  geico
 | head 50
 | eval temp=_time 
 | fields - _* 
 | eval _time=temp 
 | fields - temp
 | table _time *
 | untable _time fieldname fieldvalue 
 | where match(fieldvalue,"geico") 
 | xyseries _time fieldname fieldvalue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It finished and said - &lt;CODE&gt;50 events (before 4/13/17 10:35:24.000 AM)&lt;/CODE&gt; but no results are shown.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 16:15:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327141#M97442</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-04-13T16:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327142#M97443</link>
      <description>&lt;P&gt;Can you run the query in parts and see which step the data goes away? (run everything before untable and then keep adding rest)&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 16:21:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327142#M97443</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-04-13T16:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327143#M97444</link>
      <description>&lt;P&gt;Perfect - I'll do so...&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 17:18:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327143#M97444</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-04-13T17:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: How can I show the fields which have a specific value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327144#M97445</link>
      <description>&lt;P&gt;Let me accept it meanwhile ; -) much much appreciated!!!!  &lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 19:05:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-show-the-fields-which-have-a-specific-value/m-p/327144#M97445</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-04-13T19:05:08Z</dc:date>
    </item>
  </channel>
</rss>

