Splunk Search

Query to filter logs based on the condition

navd
New Member

I have host=abc_cloud_aws_dev
host = abc_cloud_aws_qa

Here is my basic search string
index=myindex host=abc_cloud* , to display all the events , but I want to check and display events which are having abc_cloud and also which contains dev in as part of host

Tags (1)
0 Karma
1 Solution

pradeepkumarg
Influencer

Will this work ?

  index=myindex (host=abc_cloud* OR host=\*dev*) 

View solution in original post

0 Karma

pradeepkumarg
Influencer

Will this work ?

  index=myindex (host=abc_cloud* OR host=\*dev*) 
0 Karma

navd
New Member

yes it worked thanks

0 Karma
Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...