Splunk Search

Output events from two different logs/Session IDs

ferza
Explorer

I have a simple search that goes as such:

sessionid=UNIQIESESSIONID "connected to "

This outputs a single logline/event from the Session log contains the string "connected to "

Is there a way I can output this from two different unique session ID's? I thought I could do something like:

sessionid=UNIQIESESSIONID "connected to " OR sessionid=UNIQIESESSIONID "connected to "

But that did not work. Any suggestions?

Tags (2)
0 Karma
1 Solution

ramdaspr
Contributor

Try

(sessionid=UNIQIESESSIONID OR sessionid=UNIQIESESSIONID ) "connected to " 

View solution in original post

ramdaspr
Contributor

Try

(sessionid=UNIQIESESSIONID OR sessionid=UNIQIESESSIONID ) "connected to " 

ferza
Explorer

That worked! Thanks!

0 Karma
Get Updates on the Splunk Community!

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...