Splunk Search

Extract fields with specific value where multiple combination of "value" exists for same "Key"

Deprasad
Path Finder

I've the below event, where I need to display only event which has action=test and category=testdata.

test
{
line1: 1
"action": "test",

"category": "testdata",

}

test1

{
line1: 1
"action": "event",

"category": "testdata",

}
test2

{
line1: 1
"action": "test",

"category": "duplicate_data",

}
Labels (3)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

If this is a verbatim copy of your original event you have much more problems with your data.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What have you tried so far?

0 Karma

Deprasad
Path Finder

I've an event looks like below. The Key value pair of "test:22345" exists more than 1 time and I need only this events in the output as table or count of events.

{"test":"22345","testType":"model"},{"test":"22345","testType":"model1"},{"test":"22345","testType":"model2"}
0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and stall ...

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

Are you ready to uncover the threats hiding in plain sight? Join us for "Print, Leak, Repeat: UEBA Insider ...

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...