Splunk Search

How to filter a field from the log where the values change

Rajpranar
Explorer

How to filter a field from the log where the values change for example please see below,

logfile =(result1=0 result2=5 result3=10 result4=14)  at 5AM

logfile =(result1=8 result2=5 result3=10 result4=14) at 5:10Am

logfile =(result1=4 result2=5 result3=10 result4=14) at 5:20Am

logfile =(result1=3 result2=5 result3=10 result4=14) at 5:30Am

i want query to return result and show when result1 is greater than 5, please help

Current state im at =index=indexname | search sourcetype=eventname "result1=5" gives results but if i do
index=indexname | search sourcetype=eventname "result1> 5" returns nothing

 

0 Karma
1 Solution

marnall
Builder

I recommend using the "where" command:

index=indexname sourcetype=eventname
| where result1 > 5



(note this assumes that result1 is already an extracted field. If not, try this:

index=indexname sourcetype=eventname
| rex field=_raw "result1=(?<result1>\d*)"
| where result1 > 5

View solution in original post

Rajpranar
Explorer

Thanks @marnall this worked perfectly.

0 Karma

marnall
Builder

I recommend using the "where" command:

index=indexname sourcetype=eventname
| where result1 > 5



(note this assumes that result1 is already an extracted field. If not, try this:

index=indexname sourcetype=eventname
| rex field=_raw "result1=(?<result1>\d*)"
| where result1 > 5
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...