Splunk Search

help on where condition

jip31
Motivator

hi

I need to add a where condition on the field 'Time period with no info' below
But the where command doesn't works even if there is an existing field with "08:53:07-000" value
What I have to do please??

| where 'Time period with no info' = "08:53:07-000" 
| stats dc(USERNAME)
Tags (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@jip31

Have you tried by renaming column name before where? like below.

YOUR_SEARCH 
| rename "Time period with no info" as Temp 
| where Temp = "08:53:07-000"
0 Karma

jip31
Motivator

now it works thanks

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

Great @jip31
Can you please upvote and accept the answer to close this question?

0 Karma

KailA
Contributor

I tried this

| makeresults
| eval "Time period with no info" = "08:53:07-000"
| where 'Time period with no info' = "08:53:07-000"

and it seems to work so could you please send us the full search or maybe an example of your data to have more informations ? 🙂

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Synthetic Monitoring - Resolved Incident on Detector Alerts

We’ve discovered a bug that affected the auto-clear of Synthetic Detectors in the Splunk Synthetic Monitoring ...

Video | Tom’s Smartness Journey Continues

Remember Splunk Community member Tom Kopchak? If you caught the first episode of our Smartness interview ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud? Learn how unique features like ...