Splunk Search

Extract fields with specific value where multiple combination of "value" exists for same "Key"

Deprasad
Path Finder

I've the below event, where I need to display only event which has action=test and category=testdata.

test
{
line1: 1
"action": "test",

"category": "testdata",

}

test1

{
line1: 1
"action": "event",

"category": "testdata",

}
test2

{
line1: 1
"action": "test",

"category": "duplicate_data",

}
Labels (3)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If this is a verbatim copy of your original event you have much more problems with your data.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What have you tried so far?

0 Karma

Deprasad
Path Finder

I've an event looks like below. The Key value pair of "test:22345" exists more than 1 time and I need only this events in the output as table or count of events.

{"test":"22345","testType":"model"},{"test":"22345","testType":"model1"},{"test":"22345","testType":"model2"}
0 Karma
Get Updates on the Splunk Community!

AppDynamics Summer Webinars

This summer, our mighty AppDynamics team is cooking up some delicious content on YouTube Live to satiate your ...

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...