Splunk Search

Filtering in search string.

SplunkBaby
Explorer

I have a working search string like

host=ABC | rename  "H Code" TO HCODE | join HCODE [search host= EFG  ] | timechart span=1d sum(Visits) AS Visit, count(USERCOUNT) AS UserCount  by HCODE | foreach Visit* [ eval Avg:<<MATCHSTR>> = '<<FIELD>>'/'UserCount<<MATCHSTR>>'] | fields Avg:*

I want to avoid Avg value less than 0.I tried where it is not working.
can anybody help.

Tags (3)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi,

here is a run everywhere example how to do this:

index=_internal source=*metrics.log | eventstats avg(kbps) as avg_kbps by series | eval avg:*=avg_kbps | table avg:* | search avg:*>1.5

this will return an table of all values of avg:* higher then 1.5

cheers, MuS

0 Karma

SplunkBaby
Explorer

The query which you have give is working.I think the reason behind is avg:* is fixed field name.In my case field name is dynamic. Avg:<>

0 Karma

MuS
SplunkTrust
SplunkTrust

update ping

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...