Splunk Search

Question on include/exclude events

Deepz2612
Explorer

In the logs I wanted to include events that has the string "uri=https://www.bikerace.com" and if it is not present I wanted to include events with string "BAD_REQUEST_EXCEPTION".
But at times the case is that both the strings are present and when I write a query condition with "OR" statement both gets selected.
But I wat either of it only..If the 1st string is present,only that event..If the first string is not present then i wanted to have the event with second string.

Kindly help me with it.

Thanks!

Tags (1)
0 Karma

DavidHourani
Super Champion

Hi @Deepz2612,

Would be great if you could share your search string but I'm supposing that you have both fields uri and request and your search looks like this :

index=yourindex uri="https://www.bikerace.com" OR request="BAD_REQUEST_EXCEPTION"

You will need to modify the logic to make it look like this :

  index=yourindex (uri="https://www.bikerace.com" AND NOT request="BAD_REQUEST_EXCEPTION") OR (request="BAD_REQUEST_EXCEPTION" AND NOT uri="https://www.bikerace.com")

Let me know if that helps.

Cheers,
David

0 Karma
Get Updates on the Splunk Community!

Deprecation of Splunk Observability Kubernetes “Classic Navigator” UI starting ...

Access to Splunk Observability Kubernetes “Classic Navigator” UI will no longer be available starting January ...

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...