Splunk Search

Filtering in search string.

SplunkBaby
Explorer

I have a working search string like

host=ABC | rename  "H Code" TO HCODE | join HCODE [search host= EFG  ] | timechart span=1d sum(Visits) AS Visit, count(USERCOUNT) AS UserCount  by HCODE | foreach Visit* [ eval Avg:<<MATCHSTR>> = '<<FIELD>>'/'UserCount<<MATCHSTR>>'] | fields Avg:*

I want to avoid Avg value less than 0.I tried where it is not working.
can anybody help.

Tags (3)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi,

here is a run everywhere example how to do this:

index=_internal source=*metrics.log | eventstats avg(kbps) as avg_kbps by series | eval avg:*=avg_kbps | table avg:* | search avg:*>1.5

this will return an table of all values of avg:* higher then 1.5

cheers, MuS

0 Karma

SplunkBaby
Explorer

The query which you have give is working.I think the reason behind is avg:* is fixed field name.In my case field name is dynamic. Avg:<>

0 Karma

MuS
SplunkTrust
SplunkTrust

update ping

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...