Good Afternoon,
I am new to Splunk and have a query that is working fine in the search but once saved in the Dashboard it errors out with "Search Query is not Fully Resolved." Anyone have any ideas on what it might be? Thanks for your help in advance.
index=main sourcetype=index=main sourcetype="wineventlog:security" ("EventCode=4776" AND Keywords="Audit Failure") OR ("EventCode=680" AND "Failure Audit") NOT (Logon_Account="$" OR Logon_account="*$") | eval "User Account" = coalesce(Logon_Account,Logon_account)| top limit=20 host
This in the beginning of the search would give me a headache if I was Splunk:
index=main sourcetype=index=main
Change it to:
index=main sourcetype="wineventlog:security"
Yes, two $ sign make splunk think its a token. see following post,
http://answers.splunk.com/answers/114841/search-query-is-not-fully-resolved-when-using-a-in-a
Thanks for catching that but it was a copy paste error. I am still getting the same error message. I have chopped apart the query and it seems to be something with the "NOT (Logon_Account="$" OR Logon_account="$")" part. Any ideas?