Splunk Search

How to filter a field from the log where the values change

Rajpranar
Explorer

How to filter a field from the log where the values change for example please see below,

logfile =(result1=0 result2=5 result3=10 result4=14)  at 5AM

logfile =(result1=8 result2=5 result3=10 result4=14) at 5:10Am

logfile =(result1=4 result2=5 result3=10 result4=14) at 5:20Am

logfile =(result1=3 result2=5 result3=10 result4=14) at 5:30Am

i want query to return result and show when result1 is greater than 5, please help

Current state im at =index=indexname | search sourcetype=eventname "result1=5" gives results but if i do
index=indexname | search sourcetype=eventname "result1> 5" returns nothing

 

0 Karma
1 Solution

marnall
Motivator

I recommend using the "where" command:

index=indexname sourcetype=eventname
| where result1 > 5



(note this assumes that result1 is already an extracted field. If not, try this:

index=indexname sourcetype=eventname
| rex field=_raw "result1=(?<result1>\d*)"
| where result1 > 5

View solution in original post

Rajpranar
Explorer

Thanks @marnall this worked perfectly.

0 Karma

marnall
Motivator

I recommend using the "where" command:

index=indexname sourcetype=eventname
| where result1 > 5



(note this assumes that result1 is already an extracted field. If not, try this:

index=indexname sourcetype=eventname
| rex field=_raw "result1=(?<result1>\d*)"
| where result1 > 5
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...