Splunk Search

Can you help us build a query that removes null values from a table?

roopeshetty
Path Finder

Hi guys,

Our search query is like this

LogName=Application SourceName=Script | rex "Days Remaining: (?.*)days" | rex ": Origin=(?.+?)\," | rex (?.+?)\; | table CertificateName, DaysRemaining

Output will provide us a table with 2 columns as “CertificateName” and “DaysRemaining” in which “CertificateName” will have the names of the Certificates and “DaysRemaining” will have the days left for certificate expiry.

But sometimes, the “DaysRemaining” column will have not any numbers for few of the “CertificateNames” and remains blank as attached here in the screen shot.

Is there any way...

  1. We can remove the rows which have no values (blank rows) using the above query?
  2. Can we input some text string like “Not Available” where ever we have these null values using the above query?

Please advise.

0 Karma

vnravikumar
Champion

Hi @roopeshetty

Try like

LogName=Application SourceName=Script | rex "Days Remaining: (?.)days" | rex ": Origin=(?.+?)\," | rex (?.+?)\; |search DaysRemaining=* | table CertificateName, DaysRemaining

This will remove null row of DaysRemaining

0 Karma

vnravikumar
Champion

you can try | fillnull value="Not Available" DaysRemaining

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...