Splunk Search

help fixing cli search with sourcetype specified

alfredoh14
Engager

when i type in the command line (cmd not powershell):
splunk search "*" -maxout 0 | find /c /v ""

I get the return of about 195k records.

however when i filter by one of the sourcetype, from one of the splunk free tutorials, by typeing:
splunk search "*" 'sourcetype=e' -maxout 0 | find /c /v ""

I still get the same result of 195k records.

the "| find /c /v "" " should return only the line count.
so if i filter by the sourcetype it should return around 165k records which are the number of records associated with that source type currently in my splunk db.

can someone help me correct my syntax, i tried google searches but none were able to give me an example, which I think is due to the fact I do not know how the syntax should work in the first place.
I am using the windows cmd, and I plan to use the windows cmd, not the website interface, thanks for understanding.

Labels (1)
0 Karma

tscroggins
Influencer

@alfredoh14 

In your examples, "*" is your search string. To expand it, add search terms to that string:

splunk search "* sourcetype=e" -maxout 0 | find /c /v ""

To dispense with find and have Splunk report the event count:

splunk search "* sourcetype=e | stats count"

If you know the index you're searching, you can use tstats for much faster results:

splunk search "| tstats count where index=main sourcetype=e"

0 Karma
Get Updates on the Splunk Community!

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...

Let’s Get You Certified – Vegas-Style at .conf24

Are you ready to level up your Splunk game? Then, let’s get you certified live at .conf24 – our annual user ...