Splunk Search

Not displaying key with no value

mark112
Engager

I am writing to ask a question, which is probably an easy one. I am curious, how would you search for all occurances of a key in a particular index, while excluding identified keys that contain no value. For example, if I wanted to table all the keys named target_keys in the index, target_index, I may use the following search:

index = target_index | table target_keys

This would produce a table of all the key value pairs for target_keys. But How would I exclude the table command returning target_keys occurances that contain no value? Or that contain a specific value for which I am trying to exclude from the table?

Thanks in advance for any assistance!

Tags (3)
0 Karma

mark112
Engager

I will test this. Thank you, VERY much

0 Karma

lguinn2
Legend

Here are a few ideas

index=target_index | where isnull(target_key) | table target_keys

or

index=target_index | where isnotnull(target_key) | table target_keys

or

index=target_index target_key="goodvalue" | table target_keys

or

index=target_index NOT target_key="badvalue" | table target_keys
0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...