Splunk Search

Only show logs where field value has a decimal place

bcarr12
Path Finder

Hi all,

I'm trying to run a search that only finds specific events in a log which have field X equal to a number with a decimal place. Creating the search of simply X>0 returns all log events with any number, which is a good start. Now I'm just looking to filter the results a bit more so only logs having field X equal to any number that has a decimal place will be displayed. What would be the best way to accomplish this?

Thanks.

0 Karma
1 Solution

DalJeanis
Legend

This searches for a period anywhere in field myfield, and drops all records that do not have one.

| regex myfield="\."

View solution in original post

0 Karma

DalJeanis
Legend

This searches for a period anywhere in field myfield, and drops all records that do not have one.

| regex myfield="\."
0 Karma

bcarr12
Path Finder

This is exactly what I needed. Thank you!

Get Updates on the Splunk Community!

Announcing the Expansion of the Splunk Academic Alliance Program

The Splunk Community is more than just an online forum — it’s a network of passionate users, administrators, ...

Learn Splunk Insider Insights, Do More With Gen AI, & Find 20+ New Use Cases You Can ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Buttercup Games: Further Dashboarding Techniques (Part 7)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...