Splunk Search

Not displaying key with no value

mark112
Engager

I am writing to ask a question, which is probably an easy one. I am curious, how would you search for all occurances of a key in a particular index, while excluding identified keys that contain no value. For example, if I wanted to table all the keys named target_keys in the index, target_index, I may use the following search:

index = target_index | table target_keys

This would produce a table of all the key value pairs for target_keys. But How would I exclude the table command returning target_keys occurances that contain no value? Or that contain a specific value for which I am trying to exclude from the table?

Thanks in advance for any assistance!

Tags (3)
0 Karma

mark112
Engager

I will test this. Thank you, VERY much

0 Karma

lguinn2
Legend

Here are a few ideas

index=target_index | where isnull(target_key) | table target_keys

or

index=target_index | where isnotnull(target_key) | table target_keys

or

index=target_index target_key="goodvalue" | table target_keys

or

index=target_index NOT target_key="badvalue" | table target_keys
0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...