Splunk Search

How to apply this filter condition to my search result?

srohith87
New Member

Hi team,

I am new to Splunk. Please guide me how to apply a filter condition in which I need to extract only count =1.

Below is my search:

index="victindex" sourcetype="ContainerEvents" | rex field=_raw "^(?:[^\.\n]*\.){2}(?P\w+)" | search qceventtype=ContainerEvent | xmlkv |  stats count as "Count of Search Object" by _time | where count = 1

Above search is not giving me any result set, even though I have 27 events.

0 Karma

woodcock
Esteemed Legend

You are doing where by a field name ( count ) that does not exist. Try this:

index="victindex" sourcetype="ContainerEvents" | rex field=_raw "^(?:[^\.\n]*\.){2}(?P\w+)"
| search qceventtype=ContainerEvent | xmlkv
| stats count BY _time | where count = 1
| rename count AS "Count of Search Object"
0 Karma

jkat54
SplunkTrust
SplunkTrust

Here the count is the count of events. So if you have 27 events, count does not equal to 1 and your where clause is excluding the results.

Can you provide a sample of the data?

0 Karma

sundareshr
Legend

Try

....  | stats count by _time | where count = 1 | rename count as "Count of Search Object"

srohith87
New Member

Thank you sundar, It works...
can you tell me how difference it is filtering the aggregated group value such as "having max(salary) > 25000", how can I apply this in the search command

Hi JKAT54,

yes, the count I represented is total events. To the top of it I will be applying the count of specific column to eventually evaluate the total by its.

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...