Splunk Search

Splunk

vinod0313
Explorer

Hello

I have a log like this:

ABC=true,DEF=false,GHI=false,JKL=true


I want to show only ABC and JKL in the result,because these are having value as true.

Result should be like below


ABC
JKL

Labels (1)
0 Karma

to4kawa
Ultra Champion

index=_internal | head 1 | fields _raw
| eval _raw="ABC=true,DEF=false,GHI=false,JKL=true"
| rename COMMENT as "this is sample"

| kv
| eval col="1"
| table col *
| untable col field value
| where value="true"

0 Karma

vinod0313
Explorer

That is not a static log,it is dynamic log

ABC=TRUE or FALSE depend upon Source The ABC value may differ 
so if the value of ABC=TRUE then we have to show ABC in result other wise No.

0 Karma

rnowitzki
Builder

Hi @vinod0313 ,

@to4kawa's option is dynamic like that.  You only need the part starting with | kv
The lines above were just to make up some sample data.

You can change ABC to ACB or ACAB or whatever your data will have - only the ones with "true" as value will be listed. Give it a try 🙂

BR
Ralph

--
Karma and/or Solution tagging appreciated.
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...