Splunk Search

How to filter columns in a search query splunk

mahbs
Path Finder

Hi Guys,

I have a simple question. I have a search query, and it basically outputs lots of fields. Is there a way of filter for a specific column in the search query?

index=xxx sourcetype=xxx host=xxx OR host=xxx| eval UNIQUE=toString(xx)| eventstats dc(host) as ID by UNIQUE | where ID=2 | eval raw=toString(YYYY)| stats values(host) AS hosts BY raw | where mvcount(hosts) = 1 | replace xxx with xxx, xxx with xxxin hosts

Kind Regards
Mahbs

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi mahbs,
you can use the table command ( https://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Table ) to display only the requested fields or fields - fieldname ( https://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Fields ) to hide some column.
Bye.
Giuseppe

cmerriman
Super Champion

or to add onto this, use the fields field1 field2.... to show fields, instead of the table command

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

Hi

Have you tried fields command ?

eg.
... | fields host, ip | fields - _*

Doc: http://docs.splunk.com/Documentation/Splunk/7.0.0/SearchReference/Fields

Thanks

0 Karma
Get Updates on the Splunk Community!

Pro Tips for First-Time .conf Attendees: Advice from SplunkTrust

Heading to your first .Conf? You’re in for an unforgettable ride — learning, networking, swag collecting, ...

Raise Your Skills at the .conf25 Builder Bar: Your Splunk Developer Destination

Calling all Splunk developers, custom SPL builders, dashboarders, and Splunkbase app creators – the Builder ...

Hunt Smarter, Not Harder: Discover New SPL “Recipes” in Our Threat Hunting Webinar

Are you ready to take your threat hunting skills to the next level? As Splunk community members, you know the ...