Splunk Search

Searchmatch with AND does not work

christi2019
New Member

Notifications and ChangeNotifications present in both indices and I want to separate them by index type and count them. Looks like searchmatch with AND function seems not working.Is there better way to have these fields seperated by index type.

index=service1 OR index=service2
*/application/Notification OR
*/application/changeNotification
| eval timeevents=case(searchmatch("Notifcations" AND "index=service1" ),"Service1NewNotification",
searchmatch("Notifcations" AND "index=service2" ),"service2NewNotification",
searchmatch("changeNotifications"AND "index=service1"), "service1newChangeNotifications",
searchmatch("changeNotifications"AND "index=service2"), "service2newChangeNotifications",

| stats count by index, timeevents

Tags (1)
0 Karma
1 Solution

niketn
Legend

@christi2019 try the following

1) Since index is already a field you do not need to do searchmatch which looks at entire raw data for pattern match.
2) Since your stats is already splitting data by index and timeevents, there is no need to merge index while evaluating timeevents.

| eval timeevents=case(searchmatch("Notifcations"),"NewNotification",
                       searchmatch("Notifcations"),"NewNotification",
                       searchmatch("changeNotifications"), "newChangeNotifications",
                       searchmatch("changeNotifications"), "newChangeNotifications")
| stats count by index, timeevents

However, if you want to perform multiple matches inside a case expression you can try one of the following approaches. All should give same output but with different performance.
Option 2

| eval timeevents=case(searchmatch("Notifcations") AND index="service1","Service1NewNotification",
                       searchmatch("Notifcations") AND index="service2","service2NewNotification",
                       searchmatch("changeNotifications") AND index="service1", "service1newChangeNotifications",
                       searchmatch("changeNotifications") AND index="service2", "service2newChangeNotifications")

Option 3: Following may not work unless your raw data actually has text like "index=service"

| eval timeevents=case(searchmatch("Notifcations") AND searchmatch("index=service1" ),"Service1NewNotification",
                       searchmatch("Notifcations") AND searchmatch("index=service2"),"service2NewNotification",
                       searchmatch("changeNotifications") AND searchmatch("index=service1"), "service1newChangeNotifications",
                       searchmatch("changeNotifications") AND searchmatch("index=service2"), "service2newChangeNotifications")
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

0 Karma

christi2019
New Member

thanks Niketnilay.

0 Karma

niketn
Legend

@christi2019 try the following

1) Since index is already a field you do not need to do searchmatch which looks at entire raw data for pattern match.
2) Since your stats is already splitting data by index and timeevents, there is no need to merge index while evaluating timeevents.

| eval timeevents=case(searchmatch("Notifcations"),"NewNotification",
                       searchmatch("Notifcations"),"NewNotification",
                       searchmatch("changeNotifications"), "newChangeNotifications",
                       searchmatch("changeNotifications"), "newChangeNotifications")
| stats count by index, timeevents

However, if you want to perform multiple matches inside a case expression you can try one of the following approaches. All should give same output but with different performance.
Option 2

| eval timeevents=case(searchmatch("Notifcations") AND index="service1","Service1NewNotification",
                       searchmatch("Notifcations") AND index="service2","service2NewNotification",
                       searchmatch("changeNotifications") AND index="service1", "service1newChangeNotifications",
                       searchmatch("changeNotifications") AND index="service2", "service2newChangeNotifications")

Option 3: Following may not work unless your raw data actually has text like "index=service"

| eval timeevents=case(searchmatch("Notifcations") AND searchmatch("index=service1" ),"Service1NewNotification",
                       searchmatch("Notifcations") AND searchmatch("index=service2"),"service2NewNotification",
                       searchmatch("changeNotifications") AND searchmatch("index=service1"), "service1newChangeNotifications",
                       searchmatch("changeNotifications") AND searchmatch("index=service2"), "service2newChangeNotifications")
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...