Splunk Search

How to remove null entries from search results?

Aj01
Path Finder

i have been using this query but couldn't be able to remove null rows, please help me

index=Window_wash

| rex field=_raw "TIME.TAKEN.FOR.(?<Vendor>\w+)"
| rex field=_raw (?<Time_MS>\d+).ms
| timechart span=1m max(Time_MS) as Time_MS
| outlier Time_MS

 

 

Labels (3)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Aj01,

did you tried with the where command?

index=Window_wash
| rex field=_raw "TIME.TAKEN.FOR.(?<Vendor>\w+)"
| rex field=_raw (?<Time_MS>\d+).ms
| timechart span=1m max(Time_MS) AS Time_MS
| where Time_MS>0
| outlier Time_MS

Ciao.

Giuseppe

View solution in original post

Aj01
Path Finder

Hi @gcusello 

Thanks for helping, it worked i was using where Time_MS=* or Time_MS!=null but this worked

Thankyou

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Aj01,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Aj01,

did you tried with the where command?

index=Window_wash
| rex field=_raw "TIME.TAKEN.FOR.(?<Vendor>\w+)"
| rex field=_raw (?<Time_MS>\d+).ms
| timechart span=1m max(Time_MS) AS Time_MS
| where Time_MS>0
| outlier Time_MS

Ciao.

Giuseppe

pstout2
Loves-to-Learn

Remember, search is used to compare fields to literals whereas where is used to compare fields to fields or expressions.

Sometimes both work. Sometimes not.

| search Time_MS>0
| where isnotnull(Time_MS)

 

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...