Splunk Search

Checking log if some values exist

ivana27
Path Finder

Hello Splunkers,

please help.

I have two types of search result and i want to make alert only when 1.) occured:

1.) 2021-05-18 13:15:46.433 [Information] Downtime start:18/05/2021 11:15:46.431 sdsSrv:NotAvailable...

2.)2021-05-18 11:23:46.285 [Information] Downtime start:18/05/2021 06:05:29.241, end:18/05/2021 09:23:46.278

So, how to make search where i will get those results containing log with 'Downtime start' and not ones with 'end'

Thank you

Labels (3)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @ivana27,

you have to run a simple search like the following:

index=your_index "Downtime start" NOT "end"
| ...

or

index=your_index "Downtime start" "sdsSrv:NotAvailable"
| ...

The second one is more performant because a positive condition is always quicker than a negative condition.

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @ivana27,

you have to run a simple search like the following:

index=your_index "Downtime start" NOT "end"
| ...

or

index=your_index "Downtime start" "sdsSrv:NotAvailable"
| ...

The second one is more performant because a positive condition is always quicker than a negative condition.

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...