Splunk Search

How do I filter out event based on a value that presents only in specific event?

frank_zhang
Path Finder

Hi,

I have a search produces the following 4 events, I'd like to filter all events for an IP if any event for that IP has I2A=1, i.e. filter out both events for 1.1.1.1 and the final results should only keep the two events for 2.2.2.2

| IP      | A2I | I2A |
| 1.1.1.1 | 1   | 0   |
| 1.1.1.1 | 0   | 1   |
| 2.2.2.2 | 0   | 0   |
| 2.2.2.2 | 1   | 0   |

Thanks.

Tags (2)
0 Karma
1 Solution

gfuente
Motivator

Hello

You can use the eventstats command to get this

yourbasesearch | eventstats max(I2A) as MAXI2A by IP | search MAXI2A="0" | ...

Regards

View solution in original post

gfuente
Motivator

Hello

You can use the eventstats command to get this

yourbasesearch | eventstats max(I2A) as MAXI2A by IP | search MAXI2A="0" | ...

Regards

frank_zhang
Path Finder

Thanks for your solution.

Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...