Splunk Search

multivalue fields

poladbank
New Member

Hi I'm trying to count the number of times of a specific values "not match" exist in a multi-value field, search for events where this value appears more then once.

add an example

nameCheckID

aaa-1
bbb-2
ccc-3

not match
match
match
6564
ddd-1
eee-2
fff-3
not match
match
not match
7875

 

because in the lower row the value "not match" exist more then 1 time (>1).
I don't found a suitable command.
would appreciate  help:)

Labels (2)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| chart values(name) as name count by ID Check
| where 'count: not match' > 1
| rename "name: not match" as name, "count: not match" as count
| table ID name count
0 Karma

poladbank
New Member

Thank you for your fast response!
I've tried your solution and had a problem in the where part.

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...