Splunk Search

Only show logs where field value has a decimal place

bcarr12
Path Finder

Hi all,

I'm trying to run a search that only finds specific events in a log which have field X equal to a number with a decimal place. Creating the search of simply X>0 returns all log events with any number, which is a good start. Now I'm just looking to filter the results a bit more so only logs having field X equal to any number that has a decimal place will be displayed. What would be the best way to accomplish this?

Thanks.

0 Karma
1 Solution

DalJeanis
Legend

This searches for a period anywhere in field myfield, and drops all records that do not have one.

| regex myfield="\."

View solution in original post

0 Karma

DalJeanis
Legend

This searches for a period anywhere in field myfield, and drops all records that do not have one.

| regex myfield="\."
0 Karma

bcarr12
Path Finder

This is exactly what I needed. Thank you!

Get Updates on the Splunk Community!

Simplifying the Analyst Experience with Finding-based Detections

    Splunk invites you to an engaging Tech Talk focused on streamlining security operations with ...

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 4

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...