Splunk Search

How to exclude multiple values from a field in search?


Here is my search:

index=database action_id="CR" OR action_id="AL" database_name= "test" NOT (server_principal_name =  account_1 OR server_prinicipal_name = account_2 OR server_prinicipal_name = account_3)

Search result still showing event including server_prinicipal_name=account_1  server_principal_name=account_2 and account_3


Labels (1)
Tags (1)
0 Karma

Make sure the field name and values are spelled correctly. The field name in the example search has different spellings. Have you tried putting quotation marks around the values?
If this reply helps you, an upvote would be appreciated.
0 Karma

Tune In & Win!

Don't miss out on your
chance to take home free
prizes by helping our players
save the Splunk Cloudom!

Dungeons & Data
Monsters: Splunk O11y
Day Editions Games
stream live:
5/4 at 6:30pm PST
5/5 at 7:00pm PST