Splunk Search

Events with null fields being discarded in results?

echojacques
Builder

Hello, in my search below, events with null fields are being discarded/excluded from the results. Specifically, any src_ip that doesn't have a region or a city gets excluded. Only src_ip's with complete geoip information (country & region & city) are included in the results. How can I modify this search so that I see all results including src_ip's with incomplete geoip information?

sourcetype="IPS" | geoip src_ip | stats sum(hit_count) as hits by src_ip country region city signature | table src_ip country region city signature hits | sort -hits | head 10

Thanks!

Tags (3)
0 Karma
1 Solution

lguinn2
Legend

Try this

sourcetype="IPS" 
| geoip src_ip 
| fillnull value="Unknown" country region city signature
| stats sum(hit_count) as hits by src_ip country region city signature 
| sort -hits
| head 10

View solution in original post

lguinn2
Legend

Try this

sourcetype="IPS" 
| geoip src_ip 
| fillnull value="Unknown" country region city signature
| stats sum(hit_count) as hits by src_ip country region city signature 
| sort -hits
| head 10

echojacques
Builder

Thanks, this works perfectly! I really appreciate it.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...