Splunk Search

Setting several independent AND/OR conditions on single search

jpawloski
Path Finder

I'm running a search against a single index and sourcetype for events that have slightly different data. I want to set conditions as follows but I can't seem to ever get the second set of conditions read:

 index=this sourcetype=that Field_01=65 (CONNECTION_TYPE=TCP AND ROW_COUNT > 0) OR (CONNECTION_TYPE=FTP AND BYTES_SENT > 0) | ...

When run, I only see the first CONNECTION_TYPE in my events. I would use the CONNECTION_TYPE=THIS OR THAT but I have that field that isn't shared by both sets of conditions. What's the cleanest way to do this?

0 Karma
1 Solution

woodcock
Esteemed Legend

Try this (note the insertion of double-quotes and parentheses):

  index=this AND sourcetype="that" AND Field_01="65" AND ((CONNECTION_TYPE="TCP" AND ROW_COUNT > 0) OR (CONNECTION_TYPE="FTP" AND BYTES_SENT > 0))
| ...

View solution in original post

woodcock
Esteemed Legend

Try this (note the insertion of double-quotes and parentheses):

  index=this AND sourcetype="that" AND Field_01="65" AND ((CONNECTION_TYPE="TCP" AND ROW_COUNT > 0) OR (CONNECTION_TYPE="FTP" AND BYTES_SENT > 0))
| ...

jpawloski
Path Finder

I had hoped one day to be graced with a reply from woodcock. That day has come. Thanks man!

woodcock
Esteemed Legend

I do aim to please! Whenever you are mixing AND and OR, you must use parentheses appropriately or you will go off track quickly.

0 Karma

HiroshiSatoh
Champion

I think that the search sentence is not wrong.
It will be like this.

 index=this AND sourcetype=that AND Field_01=65  
     AND ((CONNECTION_TYPE=TCP AND ROW_COUNT > 0) OR (CONNECTION_TYPE=FTP AND BYTES_SENT > 0) )| ...
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...