Splunk Search

Multivalue Field Filterung search

mklhs
Path Finder

Hello,

I need your help.
I have a field which contains multivalue.
Example:
Table


Foo


in cash


foo
in cash


I need a way to only display events that have foo and bar in this field. I tried to count the values and filter them accordingly but it doesn't work.

0 Karma
1 Solution

renjith_nair
Legend

@mklhs ,

Try

your search |where isnotnull(mvfind(field_name,"foo")) AND isnotnull(mvfind(field_name,"bar"))

Please note that the argument to mvfind is REGEX . So based on your field value, you may combine that with regex as well

Reference : https://docs.splunk.com/Documentation/Splunk/7.3.1/SearchReference/MultivalueEvalFunctions#mvfind.28...

---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@mklhs ,

Try

your search |where isnotnull(mvfind(field_name,"foo")) AND isnotnull(mvfind(field_name,"bar"))

Please note that the argument to mvfind is REGEX . So based on your field value, you may combine that with regex as well

Reference : https://docs.splunk.com/Documentation/Splunk/7.3.1/SearchReference/MultivalueEvalFunctions#mvfind.28...

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...