Splunk Search

How to apply this filter condition to my search result?

srohith87
New Member

Hi team,

I am new to Splunk. Please guide me how to apply a filter condition in which I need to extract only count =1.

Below is my search:

index="victindex" sourcetype="ContainerEvents" | rex field=_raw "^(?:[^\.\n]*\.){2}(?P\w+)" | search qceventtype=ContainerEvent | xmlkv |  stats count as "Count of Search Object" by _time | where count = 1

Above search is not giving me any result set, even though I have 27 events.

0 Karma

woodcock
Esteemed Legend

You are doing where by a field name ( count ) that does not exist. Try this:

index="victindex" sourcetype="ContainerEvents" | rex field=_raw "^(?:[^\.\n]*\.){2}(?P\w+)"
| search qceventtype=ContainerEvent | xmlkv
| stats count BY _time | where count = 1
| rename count AS "Count of Search Object"
0 Karma

jkat54
SplunkTrust
SplunkTrust

Here the count is the count of events. So if you have 27 events, count does not equal to 1 and your where clause is excluding the results.

Can you provide a sample of the data?

0 Karma

sundareshr
Legend

Try

....  | stats count by _time | where count = 1 | rename count as "Count of Search Object"

srohith87
New Member

Thank you sundar, It works...
can you tell me how difference it is filtering the aggregated group value such as "having max(salary) > 25000", how can I apply this in the search command

Hi JKAT54,

yes, the count I represented is total events. To the top of it I will be applying the count of specific column to eventually evaluate the total by its.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...