<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: whats wrong with this query?? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704394#M238689</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;my hint is to continue to try using stats to reach the wanted output, because join is a very slow command that requires many resources and it's always better to avoid it.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 14 Nov 2024 08:03:46 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-11-14T08:03:46Z</dc:date>
    <item>
      <title>whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703643#M238479</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;I have below splunk query which will display the output as below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger=PaymentStatusClientImpl")
| search "* Did not observe any item or terminal signal within*"
| spath "paymentStatusResponse.orderCode"
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats values(clusters) as cluster, values(host) as hostname, count(host) as count, values(correlation-id{}) as corr_id, values(paymentStatusResponse.orderCode) as order_code&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;From the above query, we have 2 loggers.&amp;nbsp;&lt;BR /&gt;In the &lt;STRONG&gt;PaymentErrorHandler&amp;nbsp;&lt;/STRONG&gt;logger, I get the message containing: "&lt;EM&gt;Did not observe any item or terminal signal within"&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;In the&amp;nbsp;&lt;STRONG&gt;EmsPaymentStatusClientImpl&amp;nbsp;&lt;/STRONG&gt;logger, I get the json response object containing "paymentStatusResponse.orderCode" value&lt;/P&gt;&lt;P&gt;In both loggers, we have&amp;nbsp;&lt;STRONG&gt;correlation-id{}&amp;nbsp;&lt;/STRONG&gt;as common element.&lt;/P&gt;&lt;P&gt;I want to output a table containing cluster, hostname, count, corr_id and order_code&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="super_edition_0-1730877795720.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/33358iCFA20669D4A40247/image-size/medium?v=v2&amp;amp;px=400" role="button" title="super_edition_0-1730877795720.png" alt="super_edition_0-1730877795720.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but the order code is alway empty.&lt;/P&gt;&lt;P&gt;Please help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 07:26:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703643#M238479</guid>
      <dc:creator>super_edition</dc:creator>
      <dc:date>2024-11-06T07:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703648#M238483</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;at first don't use the search command after the main search because your search will be slower:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger=PaymentStatusClientImpl") "Did not observe any item or terminal signal within"
| spath "paymentStatusResponse.orderCode"
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats values(clusters) as cluster, values(host) as hostname, count(host) as count, values(correlation-id{}) as corr_id, values(paymentStatusResponse.orderCode) as order_code&lt;/LI-CODE&gt;&lt;P&gt;and the asterisk isn't mandatory in a string like your one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then review the use of spath command at &lt;A href="https://docs.splunk.com/Documentation/Splunk/9.3.1/SearchReference/Spath" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.3.1/SearchReference/Spath&lt;/A&gt; :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger=PaymentStatusClientImpl") "Did not observe any item or terminal signal within"
| spath output=orderCode path=paymentStatusResponse.orderCode
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats 
     values(clusters) as cluster
     values(host) as hostname
     count(host) as count
     values(correlation-id{}) as corr_id
     values(orderCode) as order_code&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 07:41:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703648#M238483</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-06T07:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703653#M238484</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I have amended the changes query but the output of order_code column is still empty.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="super_edition_0-1730882785163.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/33360i2416EBB5E7A3C822/image-size/medium?v=v2&amp;amp;px=400" role="button" title="super_edition_0-1730882785163.png" alt="super_edition_0-1730882785163.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;order_code value&amp;nbsp; "paymentStatusResponse.orderCode" comes from 1 of the 2 logger.&lt;/P&gt;&lt;P&gt;logger name&lt;STRONG&gt; PaymentStatusClientImpl&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 08:57:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703653#M238484</guid>
      <dc:creator>super_edition</dc:creator>
      <dc:date>2024-11-06T08:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703655#M238485</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;running only your main search, do you see this field in interesting fields?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 09:18:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703655#M238485</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-06T09:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703657#M238486</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I run the main search as below:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger=PaymentStatusClientImpl")&lt;/LI-CODE&gt;&lt;P&gt;I am able to see "paymentStatusResponse.orderCode" values in interesting field.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="super_edition_0-1730887518213.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/33361iB12E78DFD27F70C0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="super_edition_0-1730887518213.png" alt="super_edition_0-1730887518213.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 10:05:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703657#M238486</guid>
      <dc:creator>super_edition</dc:creator>
      <dc:date>2024-11-06T10:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703660#M238487</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;this means that you have INDEXED_EXTRACTIONS=JSON in your props.conf and you don't need to use spath, please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger=PaymentStatusClientImpl") "Did not observe any item or terminal signal within"
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats 
     values(clusters) AS cluster
     values(host) AS hostname
     count(host) AS count
     values(correlation-id{}) AS corr_id
     values(paymentStatusResponse.orderCode) AS order_code&lt;/LI-CODE&gt;&lt;P&gt;only one thing: in the screenshot it isn't clear the field name, it seems that there's something before&amp;nbsp;&lt;SPAN&gt;paymentStatusResponse.orderCode, can you check it? are you sure that the file name is exactly&amp;nbsp;paymentStatusResponse.orderCode?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 10:22:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703660#M238487</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-06T10:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703672#M238488</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have masked the field for the purpose of safety.&lt;/P&gt;&lt;P&gt;I tried by passing&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;values(paymentStatusResponse.orderCode) AS order_code&lt;/LI-CODE&gt;&lt;P&gt;its not working.&lt;/P&gt;&lt;P&gt;With the below query&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_1) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler") "Did not observe any item or terminal signal within"
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats 
     values(clusters) as cluster
     values(host) as hostname
     count(host) as count
     values(message.tracers.ek-correlation-id{}) as corr_id&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;I am getting output as:&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%" height="25px"&gt;cluster&lt;/TD&gt;&lt;TD width="20%" height="25px"&gt;hostname&lt;/TD&gt;&lt;TD width="20%" height="25px"&gt;count&lt;/TD&gt;&lt;TD width="20%" height="25px"&gt;corr_id&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="114px"&gt;hhj&lt;/TD&gt;&lt;TD width="20%" height="114px"&gt;yueyheh&lt;/TD&gt;&lt;TD width="20%" height="114px"&gt;3&lt;/TD&gt;&lt;TD width="20%" height="114px"&gt;&lt;P&gt;1234234&lt;/P&gt;&lt;P&gt;343242&lt;/P&gt;&lt;P&gt;3423424&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Now I want to add field&amp;nbsp;&lt;STRONG&gt;paymentStatusResponse.orderCode&lt;/STRONG&gt;, which comes from another logger "&lt;STRONG&gt;PaymentStatusClientImpl&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;The common entity between these 2 loggers is&amp;nbsp;&lt;STRONG&gt;message.tracers.ek-correlation-id{}&lt;/STRONG&gt;. So that my final output will be&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="80%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%" height="25px"&gt;cluster&lt;/TD&gt;&lt;TD width="20%" height="25px"&gt;hostname&lt;/TD&gt;&lt;TD width="20%" height="25px"&gt;count&lt;/TD&gt;&lt;TD width="10%" height="25px"&gt;corr_id&lt;/TD&gt;&lt;TD width="10%"&gt;order_code&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="114px"&gt;hhj&lt;/TD&gt;&lt;TD width="20%" height="114px"&gt;yueyheh&lt;/TD&gt;&lt;TD width="20%" height="114px"&gt;3&lt;/TD&gt;&lt;TD width="10%" height="114px"&gt;&lt;P&gt;1234234&lt;/P&gt;&lt;P&gt;343242&lt;/P&gt;&lt;P&gt;3423424&lt;/P&gt;&lt;/TD&gt;&lt;TD width="10%"&gt;&lt;P&gt;order_1010&lt;/P&gt;&lt;P&gt;order_2020&lt;/P&gt;&lt;P&gt;order_3030&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 06 Nov 2024 12:30:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703672#M238488</guid>
      <dc:creator>super_edition</dc:creator>
      <dc:date>2024-11-06T12:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703678#M238489</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;ok, in other words, you need to do a join with nother search, is it correct?&lt;/P&gt;&lt;P&gt;if you haven't so many events, you could use the join command.&lt;/P&gt;&lt;P&gt;If instead you're sure to have the&amp;nbsp;&lt;STRONG&gt;message.tracers.ek-correlation-id{}&lt;/STRONG&gt; field in all events, you could use this field as correlation key:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(index= index_1 OR index= index_1) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler") "Did not observe any item or terminal signal within" OR logger="PaymentStatusClientImpl"
| eval clusters=coalesce(openshift_cluster, kubernetes_cluster)
| stats 
     values(clusters) as cluster
     values(host) as hostname
     count(host) as count
     values(paymentStatusResponse.orderCode) AS order_code
     BY message.tracers.ek-correlation-id{}&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 13:29:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703678#M238489</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-06T13:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703690#M238491</link>
      <description>&lt;P&gt;Luckily, at the beginning of the search Splunk is actually quite smart in optimizing out some common issues.&lt;/P&gt;&lt;P&gt;For example, if I run this&lt;/P&gt;&lt;PRE&gt;(index= index_1 OR index= index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger="PaymentStatusClientImpl")&lt;BR /&gt;| search "* Did not observe any item or terminal signal within*"&lt;/PRE&gt;&lt;P&gt;on my&amp;nbsp; home Splunk instance (let's ignore the fact that I won't have any matching events obviously but that's not the point) and see the job detail dashboard&amp;nbsp; I can see this&lt;/P&gt;&lt;PRE&gt;| search ("* Did not observe any item or terminal signal within*" (index=index_1 OR index=index_2) (kubernetes_namespace="kube_ns" OR openshift_namespace="ose_ns") (logger="PaymentErrorHandler" OR logger="PaymentStatusClientImpl"))&lt;/PRE&gt;&lt;P&gt;as optimized search.&amp;nbsp; And if we go to job log we can see this&lt;/P&gt;&lt;PRE&gt;[ AND any did item not ns observe or signal terminal within* [ OR index::index_1 index::index_2 ] [ OR kube ose ] [ OR paymenterrorhandler paymentstatusclientimpl ] ]&lt;/PRE&gt;&lt;P&gt;As base lispy search.&lt;/P&gt;&lt;P&gt;As we can see, Splunk was not only able to "flat" both searches into single one but also noticed that the initial wildcard was before a major breaker and a such wouldn't affect the sought terms.&lt;/P&gt;&lt;P&gt;But as a general rule of thumb - yes it's a good practice to keep your searches "tidy" and avoid wildcards at the beginning of search terms.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 13:45:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/703690#M238491</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-11-06T13:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704393#M238688</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was able to get the desired output with inner join&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 07:37:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704393#M238688</guid>
      <dc:creator>super_edition</dc:creator>
      <dc:date>2024-11-14T07:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704394#M238689</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253204"&gt;@super_edition&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;my hint is to continue to try using stats to reach the wanted output, because join is a very slow command that requires many resources and it's always better to avoid it.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 08:03:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704394#M238689</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-14T08:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: whats wrong with this query??</title>
      <link>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704406#M238694</link>
      <description>&lt;P&gt;+1 on that - don't use join unless there is absolutely no other way (or you have a very small dataset).&lt;/P&gt;&lt;P&gt;Not only it's relatively slow and resource-hungry, it has also pretty serious limitations and you can get wrong or incomplete results without knowing it.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 09:58:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/whats-wrong-with-this-query/m-p/704406#M238694</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-11-14T09:58:04Z</dc:date>
    </item>
  </channel>
</rss>

