Splunk Search

help fixing cli search with sourcetype specified


when i type in the command line (cmd not powershell):
splunk search "*" -maxout 0 | find /c /v ""

I get the return of about 195k records.

however when i filter by one of the sourcetype, from one of the splunk free tutorials, by typeing:
splunk search "*" 'sourcetype=e' -maxout 0 | find /c /v ""

I still get the same result of 195k records.

the "| find /c /v "" " should return only the line count.
so if i filter by the sourcetype it should return around 165k records which are the number of records associated with that source type currently in my splunk db.

can someone help me correct my syntax, i tried google searches but none were able to give me an example, which I think is due to the fact I do not know how the syntax should work in the first place.
I am using the windows cmd, and I plan to use the windows cmd, not the website interface, thanks for understanding.

Labels (1)
0 Karma



In your examples, "*" is your search string. To expand it, add search terms to that string:

splunk search "* sourcetype=e" -maxout 0 | find /c /v ""

To dispense with find and have Splunk report the event count:

splunk search "* sourcetype=e | stats count"

If you know the index you're searching, you can use tstats for much faster results:

splunk search "| tstats count where index=main sourcetype=e"

0 Karma
Did you miss .conf21 Virtual?

Good news! The event's keynotes and many of its breakout sessions are now available online, and still totally FREE!