Splunk Search

How do I search for a string with a partial portion of the string?

ptur
Path Finder

Can someone help explain why "partial" search doesn't work for me?

It's an ASA syslog... when I search for a full syslog event "%ASA-4-713903" it finds it, when i search "%ASA-4-" the "%ASA-4-713903" is among the results, but when I search ""%ASA-4-71390" it finds nothing.

Thanks!

0 Karma
1 Solution

cpetterborg
SplunkTrust
SplunkTrust

Add an asterisk to the end:

"%ASA-4-71390*"

I does full words only if you don't add the asterisk.

View solution in original post

0 Karma

ptur
Path Finder

Thanks for both answers!

0 Karma

lfedak_splunk
Splunk Employee
Splunk Employee

Hey @ptur, if @somesoni2 or @cpetterborg solved your problem, please don't forget to accept an answer! You can upvote posts as well. (Karma points will be awarded for either action.) Happy Splunking!

0 Karma

somesoni2
Revered Legend

For understand that behavior, you need to understand how Splunk stores the data in Splunk for text based searching. The phenomenon I'm referring to is 'Event Segmentation' and you can find all you need here:http://docs.splunk.com/Documentation/Splunk/6.6.2/Data/Abouteventsegmentation

cpetterborg
SplunkTrust
SplunkTrust

Add an asterisk to the end:

"%ASA-4-71390*"

I does full words only if you don't add the asterisk.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...