Splunk Search

Extract fields with specific value where multiple combination of "value" exists for same "Key"

Deprasad
Path Finder

I've the below event, where I need to display only event which has action=test and category=testdata.

test
{
line1: 1
"action": "test",

"category": "testdata",

}

test1

{
line1: 1
"action": "event",

"category": "testdata",

}
test2

{
line1: 1
"action": "test",

"category": "duplicate_data",

}
Labels (3)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If this is a verbatim copy of your original event you have much more problems with your data.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What have you tried so far?

0 Karma

Deprasad
Path Finder

I've an event looks like below. The Key value pair of "test:22345" exists more than 1 time and I need only this events in the output as table or count of events.

{"test":"22345","testType":"model"},{"test":"22345","testType":"model1"},{"test":"22345","testType":"model2"}
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...