Splunk Search

Extract fields with specific value where multiple combination of "value" exists for same "Key"

Deprasad
Path Finder

I've the below event, where I need to display only event which has action=test and category=testdata.

test
{
line1: 1
"action": "test",

"category": "testdata",

}

test1

{
line1: 1
"action": "event",

"category": "testdata",

}
test2

{
line1: 1
"action": "test",

"category": "duplicate_data",

}
Labels (3)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If this is a verbatim copy of your original event you have much more problems with your data.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What have you tried so far?

0 Karma

Deprasad
Path Finder

I've an event looks like below. The Key value pair of "test:22345" exists more than 1 time and I need only this events in the output as table or count of events.

{"test":"22345","testType":"model"},{"test":"22345","testType":"model1"},{"test":"22345","testType":"model2"}
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...