Splunk Search

Condition and Search string together not working

satyajit2007
Explorer

 

In Total_error Count , I want to add if the logs contains string like "exception", "failed", "error" ( Case Insensitive if possible ).  in addition to level=ERROR condition. 

 

 

index=myIndex sourcetype=mySourceType | 
timechart count as total_logs count(eval(level="INFO")) as total_info count(eval(level="WARN")) as total_warn count(eval(level="ERROR")  ) as total_error span=1h

 

 

 

Added those search criteria like this . did not work . 

count(eval(level="ERROR" OR ("Failed" OR "Exception" OR "Fatal")  )

 

The condition should be 

where level="ERROR" OR ( log like '%failed%' or log like '%Exception%')    ( case should not matter). 

Need your expert advise.

Labels (4)
Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I replied to your previous message on this topic.  https://community.splunk.com/t5/Splunk-Search/Search-strings-and-conditions-together/m-p/529223/high...

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...