Splunk Search

Not displaying key with no value

mark112
Engager

I am writing to ask a question, which is probably an easy one. I am curious, how would you search for all occurances of a key in a particular index, while excluding identified keys that contain no value. For example, if I wanted to table all the keys named target_keys in the index, target_index, I may use the following search:

index = target_index | table target_keys

This would produce a table of all the key value pairs for target_keys. But How would I exclude the table command returning target_keys occurances that contain no value? Or that contain a specific value for which I am trying to exclude from the table?

Thanks in advance for any assistance!

Tags (3)
0 Karma

mark112
Engager

I will test this. Thank you, VERY much

0 Karma

lguinn2
Legend

Here are a few ideas

index=target_index | where isnull(target_key) | table target_keys

or

index=target_index | where isnotnull(target_key) | table target_keys

or

index=target_index target_key="goodvalue" | table target_keys

or

index=target_index NOT target_key="badvalue" | table target_keys
0 Karma
Get Updates on the Splunk Community!

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...