Splunk Search

SPL-Search based on mutiple values

srs20
New Member

Hello,

i'm searching for a certain condition and wrote the query below .It works but not quite what I'm looking for

index="xyz" earliest=-18h (pidId=1 OR pidId=2 ) | stats count(eval(value>22)) AS count_status BY pidId | where count_status>=3

What I'm looking for is
pidId=1 and value >22 and occurs 3 or more times in 18 hours
AND
pidId=2 and value >37 and occurs 3 or more times in 18 hours

How can I do this?
Thanks,

0 Karma

woodcock
Esteemed Legend

Like this:

index="xyz" earliest=-18h (pidId=1 OR pidId=2 )
| stats count(eval(value>22)) AS count22plus count(eval(value>33)) AS count33plus BY pidId
| where (pidId==1 AND count22plus>=3) OR (pidId==2 AND count33plus>=3)
0 Karma

srs20
New Member

Thanks for the response.This returns null values for the first eval command and correct values for the second stats eval ..so in this case count22plus is null and count37plus is null. If I change the sequence i.e.

| stats count(eval(value>37)) as count37plus count(eval(value>22)) AS count22plus BY pidId

The command above gets the value of count22 but not count37. So,it always the second eval returning results but never the first

0 Karma

woodcock
Esteemed Legend

That is because it is never true (there are none to count)!

0 Karma

sumanssah
Communicator

Try this

index="xyz" ((pidId=1 AND value >22) OR (pidId=2 AND value >37))
| stats dc(value) as dc_value by pidId
| where dc_value > 3

srs20
New Member

Thanks,this returns results. Will need more time to validate.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

If I understand what you're looking for, this may help.

index="xyz" earliest=-18h (pidId=1 OR pidId=2 ) 
| stats count(eval(value>22)) AS count22, count(eval(value>37)) as count37 BY pidId
| where (pidId=1 AND count22>=3) OR (pidId=2 AND count37>=3)
---
If this reply helps you, Karma would be appreciated.
0 Karma

srs20
New Member

Thanks for the response.This returns null values for the first eval command and correct values for the second stats eval ..so in this case count22 is null and count37 is null. If I change the sequence i.e.

| stats count(eval(value>37)) as count37 count(eval(value>22)) AS count22 BY pidId

The command above gets the value of count22 but not count37. So,it always the second eval returnign results but never the first

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...