The Splunk search processing language (SPL) supports the Boolean operators:
The operators must be capitalized.
The AND operator is always implied between terms, that is:
web error is the same as
web AND error. So unless you want to include it for clarity reasons, you should not need to specify the AND operator.
The NOT operator only applies to the term immediately following NOT. To apply to multiple terms, you must enclose the terms in parenthesis.
Inclusion is generally better than exclusion. Searching for "access denied" will yield faster results than NOT "access granted".
Order of evaluation
The order in which the Splunk software evaluates Boolean expressions depends on whether you are using the expression with the
search command or the
where command. This includes the implied
search command at the beginning of the search.
The following table describes the order in which the Boolean expressions are evaluated.
|Order||Search command||Where command|
|1||Expressions within parentheses||Expressions within parentheses|
The following examples show how Splunk software processes Boolean expressions.
Consider the following search:
A=1 AND B=2 OR C=3
This is the same as specifying
A=1 B=2 OR C=3
When you specify values without parenthesis, this search is processed as:
A=1 AND ( B=2 OR C=3 )
Here is another example:
error NOT 403 OR 404
Without parenthesis, this search is processed as:
- Search for any event that contains the string "error" and does not contain the keyword 403
- Search for any event that contains the string "error" and 404
You can use parentheses to group Boolean expressions. For example:
error NOT (403 OR 404)
(A=1 AND B=2 ) OR C=3
This documentation applies to the following versions of Splunk Cloud Platform™: 8.0.2006, 8.0.2007, 8.1.2009, 8.1.2012, 8.1.2011, 8.1.2101, 8.1.2103, 8.2.2104, 8.2.2105 (latest FedRAMP release), 8.2.2106, 8.2.2107, 8.2.2109