<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to search on each entry in a text box input where entries are comma-delimited? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380015#M111267</link>
    <description>&lt;P&gt;I have users entering usernames separated by commas into a text box input. I want to run a search on this input that finds any events that have any of the usernames (this is for a base search). So if the user enters username1,username2,username3, I want the search &lt;PRE&gt; | search user=username1 OR user=username2 OR user=username3&lt;/PRE&gt; to run.  I tried using a multivalue field: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;pre&amp;gt;| eval user2 = $text_box_input$
| makemv delim="," user2
| mvcombine user2 delim="OR user="
| nomv user2
| search user=user2
&amp;lt;/pre&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But it wasn't working for me. Any help would be appreciated!&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jul 2018 15:59:43 GMT</pubDate>
    <dc:creator>splunk_vb</dc:creator>
    <dc:date>2018-07-30T15:59:43Z</dc:date>
    <item>
      <title>How to search on each entry in a text box input where entries are comma-delimited?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380015#M111267</link>
      <description>&lt;P&gt;I have users entering usernames separated by commas into a text box input. I want to run a search on this input that finds any events that have any of the usernames (this is for a base search). So if the user enters username1,username2,username3, I want the search &lt;PRE&gt; | search user=username1 OR user=username2 OR user=username3&lt;/PRE&gt; to run.  I tried using a multivalue field: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;pre&amp;gt;| eval user2 = $text_box_input$
| makemv delim="," user2
| mvcombine user2 delim="OR user="
| nomv user2
| search user=user2
&amp;lt;/pre&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But it wasn't working for me. Any help would be appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 15:59:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380015#M111267</guid>
      <dc:creator>splunk_vb</dc:creator>
      <dc:date>2018-07-30T15:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to search on each entry in a text box input where entries are comma-delimited?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380016#M111268</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/128502"&gt;@splunk_vb&lt;/a&gt;, if you are on Splunk 6.6 or later, this should be fairly easy with the &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Search#Multiple_field-value_comparisons_with_the_IN_operator" target="_blank"&gt;IN operator for multiple value comparison&lt;/A&gt;. For previous versions of Splunk you may have to run an independent search to set multiple OR conditions similar to the one mentioned in your question. (PS: Search event handler &lt;CODE&gt;&amp;lt;done&amp;gt;&lt;/CODE&gt; is used in version 6.5 or higher, which was &lt;CODE&gt;&amp;lt;finalized&amp;gt;&lt;/CODE&gt; in version 6.4 or before.)&lt;/P&gt;

&lt;P&gt;Please try the following run anywhere dashboard example based on Splunk's _internal index which has log_level values as INFO, WARN and ERROR for testing and showcasing both the scenarios:&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://community.splunk.com/storage/temp/255571-text-box-multiple-values-filter.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;Following is the Simple XML Code for screenshot attached:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;form&amp;gt;
  &amp;lt;label&amp;gt;Text Box Multiple Value Filter&amp;lt;/label&amp;gt;
  &amp;lt;!-- Independent search to prepare filter data for Option 2--&amp;gt;
  &amp;lt;search&amp;gt;
    &amp;lt;query&amp;gt;| makeresults
| fields - _time
| eval filterData=$tokLogLevelOption2|s$
| eval filterData=replace(filterData,",","\" OR log_level=\"")&amp;lt;/query&amp;gt;
    &amp;lt;done&amp;gt;
      &amp;lt;set token="tokLogLevelOption2Filter"&amp;gt;$result.filterData$&amp;lt;/set&amp;gt;
    &amp;lt;/done&amp;gt;
  &amp;lt;/search&amp;gt;
  &amp;lt;fieldset submitButton="false"&amp;gt;
    &amp;lt;input type="time" token="tokTime" searchWhenChanged="true"&amp;gt;
      &amp;lt;label&amp;gt;Select Time&amp;lt;/label&amp;gt;
      &amp;lt;default&amp;gt;
        &amp;lt;earliest&amp;gt;-1d@d&amp;lt;/earliest&amp;gt;
        &amp;lt;latest&amp;gt;@d&amp;lt;/latest&amp;gt;
      &amp;lt;/default&amp;gt;
    &amp;lt;/input&amp;gt;
  &amp;lt;/fieldset&amp;gt;
  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Option 1: Splunk 6.6 or higher with IN clause&amp;lt;/title&amp;gt;
      &amp;lt;input type="text" token="tokLogLevelOption1" searchWhenChanged="true"&amp;gt;
        &amp;lt;label&amp;gt;Log Level Filters ( INFO, ERROR and WARN)&amp;lt;/label&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;table&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;index=_internal sourcetype=splunkd log_level IN ($tokLogLevelOption1$)
| stats count by log_level&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
          &amp;lt;sampleRatio&amp;gt;1&amp;lt;/sampleRatio&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;option name="count"&amp;gt;20&amp;lt;/option&amp;gt;
        &amp;lt;option name="dataOverlayMode"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="percentagesRow"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
        &amp;lt;option name="rowNumbers"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="totalsRow"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;
      &amp;lt;/table&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Option 2: Splunk 6.5 or prior with OR clause&amp;lt;/title&amp;gt;
      &amp;lt;input type="text" token="tokLogLevelOption2" searchWhenChanged="true"&amp;gt;
        &amp;lt;label&amp;gt;Log Level Filters ( INFO, ERROR and WARN)&amp;lt;/label&amp;gt;
        &amp;lt;prefix&amp;gt;log_level="&amp;lt;/prefix&amp;gt;
        &amp;lt;suffix&amp;gt;"&amp;lt;/suffix&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;table&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;index=_internal sourcetype=splunkd $tokLogLevelOption2Filter$
| stats count by log_level&amp;lt;/query&amp;gt;
          &amp;lt;earliest&amp;gt;$tokTime.earliest$&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;$tokTime.latest$&amp;lt;/latest&amp;gt;
          &amp;lt;sampleRatio&amp;gt;1&amp;lt;/sampleRatio&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;option name="count"&amp;gt;20&amp;lt;/option&amp;gt;
        &amp;lt;option name="dataOverlayMode"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="percentagesRow"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
        &amp;lt;option name="rowNumbers"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="totalsRow"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;
      &amp;lt;/table&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
&amp;lt;/form&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please try out and confirm!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:40:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380016#M111268</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-09-29T20:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to search on each entry in a text box input where entries are comma-delimited?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380017#M111269</link>
      <description>&lt;P&gt;"IN" was exactly what I was looking for! Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 13:01:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-on-each-entry-in-a-text-box-input-where-entries/m-p/380017#M111269</guid>
      <dc:creator>splunk_vb</dc:creator>
      <dc:date>2018-07-31T13:01:02Z</dc:date>
    </item>
  </channel>
</rss>

