Splunk Search

How to search for the exact URI with wildcards within the URI field?

Splunk_SachinKu
New Member

Hi All,

I have following URI in my logs.

/svc/appName/1234567890/catalog/search/(status),
/svc/appName/1234567890/catalog/search/(info)
/svc/appName/1234567890/catalog/search/(update),
/svc/appName/1234567890/catalog/search/

where 1234567890 is user id. I would like to search for /svc/appName//catalog/search/.

I am using following to search
index=jboss sourcetype=jboss_tomcat_access_log /catalog/search/.

But it returns all of the above URIs.

How would I search for the exact URI for all the user ids?

Thank You!

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You're searching for text that appears in all events so you will get all events in your results. To narrow the results, add qualifiers to your search. Is the URI in a field? If so, you can try

index=jboss sourcetype=jboss_tomcat_access_log /catalog/search/ | where like(URI,"%/catalog/search/" | ...

Otherwise, try

index=jboss sourcetype=jboss_tomcat_access_log /catalog/search/ NOT "/catalog/search/(*"

to exclude events that have parens near the end.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Fueling your curiosity with new Splunk ILT and eLearning courses

At Splunk Education, we’re driven by curiosity—both ours and yours! That’s why we’re committed to delivering ...

Splunk AI Assistant for SPL 1.1.0 | Now Personalized to Your Environment for Greater ...

Splunk AI Assistant for SPL has transformed how users interact with Splunk, making it easier than ever to ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...