Splunk Search

Splunk V 6 error Search query is not fully resolved.

ericasmith411
New Member

Good Afternoon,
I am new to Splunk and have a query that is working fine in the search but once saved in the Dashboard it errors out with "Search Query is not Fully Resolved." Anyone have any ideas on what it might be? Thanks for your help in advance.

index=main sourcetype=index=main sourcetype="wineventlog:security" ("EventCode=4776" AND Keywords="Audit Failure") OR ("EventCode=680" AND "Failure Audit") NOT (Logon_Account="$" OR Logon_account="*$") | eval "User Account" = coalesce(Logon_Account,Logon_account)| top limit=20 host

0 Karma

lukejadamec
Super Champion

This in the beginning of the search would give me a headache if I was Splunk:

index=main sourcetype=index=main

Change it to:

index=main sourcetype="wineventlog:security"

0 Karma

somesoni2
Revered Legend

Yes, two $ sign make splunk think its a token. see following post,
http://answers.splunk.com/answers/114841/search-query-is-not-fully-resolved-when-using-a-in-a

ericasmith411
New Member

Thanks for catching that but it was a copy paste error. I am still getting the same error message. I have chopped apart the query and it seems to be something with the "NOT (Logon_Account="$" OR Logon_account="$")" part. Any ideas?

0 Karma
Get Updates on the Splunk Community!

A Prelude to .conf25: Your Guide to Splunk University

Heading to Boston this September for .conf25? Get a jumpstart by arriving a few days early for Splunk ...

4 Ways the Splunk Community Helps You Prepare for .conf25

.conf25 is right around the corner, and whether you’re a first-time attendee or a seasoned Splunker, the ...

Enhance Your Splunk App Development: New Tools & Support

UCC FrameworkAdd-on Builder has been around for quite some time. It helps build Splunk apps faster, but it ...