Splunk Search

Extract fields with specific value where multiple combination of "value" exists for same "Key"

Deprasad
Path Finder

I've the below event, where I need to display only event which has action=test and category=testdata.

test
{
line1: 1
"action": "test",

"category": "testdata",

}

test1

{
line1: 1
"action": "event",

"category": "testdata",

}
test2

{
line1: 1
"action": "test",

"category": "duplicate_data",

}
Labels (3)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If this is a verbatim copy of your original event you have much more problems with your data.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What have you tried so far?

0 Karma

Deprasad
Path Finder

I've an event looks like below. The Key value pair of "test:22345" exists more than 1 time and I need only this events in the output as table or count of events.

{"test":"22345","testType":"model"},{"test":"22345","testType":"model1"},{"test":"22345","testType":"model2"}
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...