Splunk Search

Searching for multiple strings

Explorer

I'm trying to collect all the log info for one website into one query. The site uses two starting url's /dmanager and /frkcurrent. I'm trying to figure out a query that will give me both the dmanager and frkcurrent records

I tried: sourcetype=access_combined frkcurrent *dmanager* but I don't get any results. I know I'm doing something wrong, but I'm not sure what. I looked through the search manual, but didn't see anything that stood out as an obvious answer.

Thanks

0 Karma
1 Solution

Motivator

You need to use OR logic in your query as such:

sourcetype=access_combined (frkcurrent OR dmanager)

Check out the this part of the documentation for a more in depth coverage of the search language.

View solution in original post

Explorer

Gah, I tied or, but didn't capitalize it.

0 Karma

Motivator

You need to use OR logic in your query as such:

sourcetype=access_combined (frkcurrent OR dmanager)

Check out the this part of the documentation for a more in depth coverage of the search language.

View solution in original post

Contributor

If I have large number of nested OR conditions..

e.g. there are 40 error codes that I need to search through in logs to show only relevant events in timechart..

what would be better option?

  multiple OR conditions  (1 OR 2  OR 3 ... OR 40 )
 configure a  lookup

In terms of tidiness or adding new codes, lookup is better definetely.

However there will be no increase in the error code list ever..

So in terms of performance is the OR Clause or lookup preferred approach?

0 Karma

Splunk Employee
Splunk Employee

@stanwin i'd suggest asking a new question and deleting this comment - this question has already been answered and might not get very much attention

State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!