Splunk Search

splunk where condition

rakeshreddy123
Engager

I have a sample query that i need to apply a where condition to:

index="web" host="blah*" sourcetype="jboss:serverLog" "want 0 out of number from CaCHE "

I need to apply a where condition to see the number greater than 100 in the above query

something like this, from below, i need to apply a where clause to show only those transactions where that number (20,40,60,120) is greater than 100

index="web" host="wjb2*ksc14*" sourcetype="jboss:serverLog" "Fetched 0 Browse Offers out of 20"
index="web" host="wjb2*ksc14*" sourcetype="jboss:serverLog" "Fetched 0 Browse Offers out of 40"
index="web" host="wjb2*ksc14*" sourcetype="jboss:serverLog" "Fetched 0 Browse Offers out of 60"
index="web" host="wjb2*ksc14*" sourcetype="jboss:serverLog" "Fetched 0 Browse Offers out of 120"

Tags (2)
0 Karma

somesoni2
Revered Legend

You would need to extract that number as a field and then apply a filter based on that. Try something like this

index="web" host="wjb2*ksc14*" sourcetype="jboss:serverLog" "Fetched 0 Browse Offers out of" | rex "Fetched 0 Browse Offers out of (?<fetchcount>\d+)" | where fetchcount>100

A better option would be save this field extraction in the props.conf so that you directly filter in the base search.

Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...