Splunk Search

OR connection with missing fileds

alex_kh
Explorer

Hello Folks, i have folowing question
I have folowing search

index=indexA OR index=indexB OR indexC user=alex OR ip=255.255.255.255 OR os= win95|table user ip os index

i expect (and i need) folowing result

alex null win95 indexA
alex 255.255.255.255 win95 indexB
null null win95 index C

curently i have
alex 255.255.255.255 win95 indexB
simon 0.0.0.0 linux indexB
betty 0.0.0.1 mac indexB

what am i doing wrong?

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It would help to see sample events.
Adding parentheses to your query will help tell Splunk how to interpret your desires. For exanple, (index=indexA OR index=indexB OR indexC) (user=alex OR ip=255.255.255.255 OR os= win95)|....

---
If this reply helps you, Karma would be appreciated.
0 Karma

harishalipaka
Motivator

@alex_kh

strings are encoded with "index1" or 'mac'

Thanks
Harish
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...