Splunk contains operator You shouldn't have to escape < and >. 5 Karma Reply. User need to deploy the latest CRDs manually. The eval command calculates an expression and puts the resulting value into a search results field. Here is what I would like to do. I am simply trying to return any. Solved: I have one lookup in which there is a field which consist Team Member A1 A2 A3 A4 A5 A6 A7 Now,If TeamMember=(A1 OR A2) AND A4 AND A7 then You signed in with another tab or window. Using the NOT approach will also return events that are missing the field which is probably not what most people want. The availability field for the product number in the products dataset contains the value "back search Description. When you specify multiple predicate expressions, you must separate each expression with a logical operator. 1. iet_ashish. Field contains string. The supported logical operators Learn how to use the Splunk eval if contains function to filter your data based on whether a specific string is contained in a field. 8 I am trying to search for any hits where LocalIP contains the aip address. This is normally present in the events in your index. Solved! Jump to solution. Expected Time: 06:15:00". The AND operator is always implied between terms, that is: Search for any event that contains the string "error" and 404; You can use parentheses to group Boolean expressions. When you use the TERM directive, the Splunk software expects to see the term you specify as a token in the lexicon in the . The stats command counts the Purchase Related and Other values in the activity field. isarray(<value>) Description. See Comparison and conditional functions in the SPL2 Search Reference. So if this above file needs to not show up I have the in Splunk now has an "IN" operator. You do not need to specify the search command at the Jul 9, 2013 · While it's probably safe to use NOT host="foo*" since the host field should always exist, I'd favor the host!="foo*" syntax; if you have a pattern you're matching on, you probably expect that field to exist in the results. I am able to convert the one used for event timestamp without issue. I'm new to splunk and currently playing around with the heavy forwarder. Problem details: Distributed Bundle Replication Manager: The current bundle directory contains a large lookup file that might cause bundle replication fail. if the line contains both the words, it should not be displayed. As you would expect, we can also use where with like to match both sides, effectively having a contains behaviour: Example: filter rows where field AcctID contains the string "94" anywhere: Contribute to splunk/splunk-operator development by creating an account on GitHub. The search command evaluates OR clauses before AND clauses. This topic contains a brief description of what the command does and a link to the specific documentation for the command. txt lob b: The file search Description. I guess I have to use a regex OR boolean operator. Follow Splunk query to get all counts including events (_raw) where match does not exist. index attribute has significance here as it is used to override the default index configuration value set on the Splunk HEC exporter. Ex: policyName = Unrestricted Inbound Access on network security groups instanceId = 5313 policyName = Contribute to splunk/splunk-operator development by creating an account on GitHub. It is divided into the following sections: Dec 5, 2024 · The splunk chart repository contains the splunk/splunk-operator chart to deploy the Splunk Operator and the splunk/splunk-enterprise chart to deploy Splunk Enterprise custom resources. All forum topics; Mit dem IN-Operator könnt ihr das Feld und eine Werteliste angeben. Hi Splunkers. You must include a space on either side of the plus ( + ) operator. If the rename that you want to use contains a space, you must enclose the rename in The plus ( + ) operator concatenates both strings and number. In the following example, the search looks only for events where the term www2 exists and the categoryId field contains sports: | search www2 categoryId=sports. You rename columns by using the AS operator on the fields in your search. source="general-access. Contribute to splunk/splunk-operator development by creating an account on GitHub. So my thinking is to use a wild card on the left of the comparison operator. However, I could not find the opposite. This release depends upon changes made concurrently in the Splunk Enterprise container images. For example, you could use the NOT operator to exclude all results from a specific source, or to exclude all results that match a particular value. Splunk, Splunk>, Turn Data Into Doing, Data-to-Everything, and D2E are trademarks The search command and regex command by default work on the _raw field. Syntax Nov 29, 2023 · A Splunk instance that forwards data to another Splunk instance is referred to as a forwarder. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Memory control options. Hello All, I have a quick question about comparison fields from a lookup table. What I mean is that it only returns the eff_mem You can use the `IN` operator like: error_code IN (4*, 500, 502, 503) @Georgin: It doesn't have to be quoted unless the value itself contains separators. The where command evaluation order is different than the evaluation order used with the search command. You can see all the configuration fields in the README of the Splunk exporter. g: CAR_MAKE IN (BMW, Volkswagon, "Mercedes Benz", Ford) 731/5000 How to extract a field that can contain letters, numbers and characters, as in the example below? The field to extract is the policyName that always comes preceded by the instanceId field. You can use the TERM directive to search for terms using wildcards. go: Provides the main() function, where everything begins; apis/: Source code for the operator's custom resource definition types controllers/: Used to register controllers that watch for changes to custom resources pkg/splunk/enterprise/: Source code for controllers that manage Splunk Searching with != If you search with the != expression, every event that has a value in the field, where that value does not match the value you specify, is returned. So you can simply add the following to your search: CAR_MAKE IN (BMW, Volkswagon, Ford) If your search values have spaces, it will need to be wrapped in quotations. that relates the key and values. For example, for true you can also use 't', 'T', 'TRUE', 'yes', or the number one ( 1 ). In other words I am getting regular reminders that these machines are disconnected, I only want NEW results so I want to keep a list of repeat offenders and ignore them. Since your events are coming from a lookup, it is unlikely that you have a _raw field, which means you need to specify a field for the regex command to filter on. input type checkbox to use conditonal operators secure. for example i want search for logs which contains errors for database only. If you have Splunk Cloud, Splunk Support administers the settings in the limits. Having trouble with the eval statements in props. Upgrading to latest version of splunk operator using helm chart will not upgrade CRDs. But when i am writting this query i am able to see the lines with the combination of these words. 41 10. iot. You use the percent ( % ) symbol as a wildcard anywhere in the <pattern-expression>. You do not need to specify the search command at the I have an index that is populated by and extensive, long running query that creates a line like "Client1 Export1 Missed. Just imagine that I have a query like this. Stack Overflow. upper (con_splunkUL). Logical operators are words that you use in an expression to search for terms that match, or don't match, a condition. For example, if you Jul 6, 2010 · Solved: Hello, I am trying to compare two fields with a simple operator but it does not seem to perform as expected. Here's an example. I think you want to use where and not search. Share. HonoReceiver - Connected successfully, creating telemetry consumer Predicate expressions. It was processed manually and now it has changed to SUCCESS. 3 8. I assume the solution is to tell Splunk to escape the double-quotes as the data is coming in. Splunk Enterprise Security is a fantastic tool that offers robust Using the Splunk addon for AWS to collect ec2 instance metadata I get an array called tags with key/value pairs such as below. g. My current splunk events are l Skip to main content. field=0 OR field=1 is fine, but you would have to use quotes for field="My String With Spaces". As a premise, `box:events' contains information for `uploaded`, `deleted`, `downloaded`, `source_item_id`, `source_parent_id` events, where `source_item_id` means file id, and `source_parent_id` means its folder id. Then it runs the search that contains it as another search job. This includes events that do not have a value in the field. The order in which the Splunk software evaluates predicate expressions depends on whether you are using the expression with the WHERE or HAVING clause in the from command, the where command, or the search command. When a logical operator is included in the syntax of a command, you must always specify the operator in uppercase. We can use "AND" operator to search for logs which contains two different keywords. eval Description. This powerful function can be used to perform a variety of tasks, such as identifying anomalous events, Part of the problem is the regex string, which doesn't match the sample data. 5 splunk-operator-xxxxxxxx to splunk-operator-controller-manager-xxxxxxxxx. Question is that I By understanding how to use the Splunk search not contains operator, you can improve your Splunk skills and gain the ability to find the information you need from your data. These operators can be used either with fields that contain numeric values or with literal numeric values. This search is looking for a field named "user" that contains the value of "login": | search user=login This s I'm using `Splunk Add-on for Box` to collect box logging data. The com. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk I have a search where the transaction status of a policy was set to FAIL. Enclose field names with operators in them in single quotes: Splunk, Splunk>, Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or This repository consists of the following code used to build the splunk-operator binary: main. What I want to do is extract the cluster name as a distinct var so that I can search on it or even better aggregate on it. Users of Red Hat OpenShift should review the Red Hat OpenShift page. log" NOT "*gen-application" Keep in mind that Splunk also has support for AND and OR. 2 172. 100. Explorer 04-26-2020 01:52 PM. Operators that produce Booleans. Splunk Operator for Kubernetes. 168. i have a checkbox option enabled in the panel so that users can select the checkbox In December, the Splunk Threat Research Team had 1 release of new security If your search string contains HTML escape code '>' and '<' when it should be '>' and ' =2101 and week<=2152 (In Simple XML dashboard COVID-19 Response SplunkBase Developers Documentation Browse " The script looks like this: #! /bin/sh # # ARGUMENTS # $0 Script name # $1 Number of events returned # $2 Search terms # $3 Fully qualified query string # $4 Name of saved search # $5 Trigger reason (for example, "The number of events was greater than 1") # $6 Browser URL to view the saved search # $8 File in which the results for this search When you use the TERM directive, the Splunk software expects to see the term you specify as a token in the lexicon in the . For example, if you search for Location!="Calaveras Farms", events that do not have Calaveras Farms as the Location are Solved: Hi Can someone help me with a query please. I am working with telephone records, and am trying to work around Splunk's inability to search for literal asterisks(*). You do not need to specify the search command at the Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. 1 8. For information about using string and numeric fields in functions, and nesting functions, see Evaluation functions. For example: If you have a more general question about Splunk functionality or When concatenating values, Splunk software reads the values as strings, regardless of the value. However when this makes it to Splunk it has a field name but it stops after the equals sympbol: query_plan = <ShowPlanXML xmlns= I know all the data is in Splunk as I can see it, it's just not being properly captures into the field. Sep 20, 2021 · Hello All, I have a quick question about comparison fields from a lookup table. I am able to get the results I need. Improve this answer. If the field name that you specify does not match a field in the output, a new field is added to the search results. this is limitation from helm There are several field values that match SPL operators or keywords, such as AS, AND, IN, and OR. Splunk, Splunk>, Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks Hello Team, I could see a lot of discussions on this forum, but none solving my issue. log b is limited to specific users. log a: There is a file has been received with the name test2. <field> A field name. This powerful operator can help you to quickly and easily find the data you need. Upgrading Splunk Enterprise Docker Image with the Operator Upgrade. My data is like this illustration purposes only: LocalIp aip 10. index to the value logs; Delete the logindex attribute. index=linux [|inputlookup suspicious_commands. In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue? (This is the first of a series of 2 blogs). You signed out in another tab or window. contains; splunk; or ask your own question. For While it's probably safe to use NOT host="foo*" since the host field should always exist, I'd favor the host!="foo*" syntax; if you have a pattern you're matching on, you probably expect that field to exist in the results. The Forwarder (optional) omit the AND operator because Splunk assumes the space between any two search terms to be AND. sourcetype=xyz status IN (100, 102, 103) Eval and where commands support in function Thank you very much for the help. A node selector requirement is a selector that contains values, a key, and an operator. An operator that performs a comparison between two expression. Hi All, Can someone please explain how I use a wildcard character in the middle of a search string? For example, if I want find all gmail addresses that start with the letter 'a', I thought I could search for emailaddress="a*@gmail. I'm currently trying to use eval to make a new variable named fullName, and concatenate the values for application and servletName with a dash(-) in the middle. Hopefully that's a bit more clear 🙂. The Advanced Installation Instructions page offers guidance for advanced configurations, including the use of private image registries, installation at cluster scope, and installing the Splunk Operator as a user who is not a Kubernetes administrator. Simply set your token prefix and suffix to " to have quotes surround your search string. I tried below conditions,but none of them worked. You should use the splunk/splunk:8. But for the life of me I can't figure out why this case statement isn't working. Feb 10, 2014 · Hi I want to get the OR result of field Emp Code in search. 8 192. properties: key: description: The label key that the selector. The indexer also searches the indexed data in response to search requests. So just enter "error" AND "database" and click on search. This function takes one argument and evaluates whether the value is an array data type. Here are a few examples: country=IN for India; country=AS or state=AS for American Samoa; iso=AND for Andorra; state=OR for Oregon; To search for field values that match operators or keywords, you must enclose the value in quotation marks. Note there are also 2 pods running for the Splunk Using the TERM() operator is not appropriate here because what you're searching for contains both minor and major segmenters and therefore does not get indexed as an entire contiguous string. This is the same as if you explicitly included the AND operator in your search, such as: I'm running a query to label memory thresholds for our app clusters, I would like to create a field called "eff_mem_threshold" based off the number of blades app name. Solved: I have the following query : sourcetype="docker" AppDomain=Eos Level=INFO Message="Eos request calculated" | eval I would use the NOT operator. When you specify multiple terms to search for, there is an implied AND operator between each term. 1. I'd like to have them as column names in a chart. . Search, analysis and visualization for actionable insights from all of your data Relational operators. Hi All, I am trying correlate 2 different search queries using where with subsearch it goes like this: host="host1" | table Value1 above search give result : 40 host="host2" | where Value2<40 above search gives a list of events But when I use above two in one search query like: host="host2" | where Event data has multiple time values in the Epoch time format. In this example there is one hit This is what I have but stuck at trying Syntax Data type Notes <bool> boolean Use true or false. 3. I get the failed policies by the below search. For example, if you search using: NOT Location="Calaveras Farms", every event is returned except the events that contain the value “Calaveras Farms”. Most Simplified Explanation != is a field expression that returns every event that has a value in the field, where that value does not match the value you specify. Engager 2 hours ago i have a table with values and based on the input checklist selection i want to display the table rows. You can verify the new Operator container is running. However, the OR operator is also commonly used to combine data from separate sources, for example (sourcetype=foo OR sourcetype=bar OR sourcetype=xyz). Hey there, Splunk Community! Exciting news: Splunk’s GovSummit 2024 is The Splunk Operator will always start Splunk Enterprise containers using a specific, unprivileged splunk(41812) user and group to allow write access to Kubernetes PersistentVolumes. Splunk, Splunk>, Turn Data Into Hi, I'm new to splunk, my background is mainly in java and sql. 0. If you are more used to Splunk SPL search syntax, you could do it like this: | eval Status=if(searchmatch("*connected*"), 1, 0) | eval MonitoringStatus = if (like (upper (con_UL),"%". I have another index that is populated with fields to be over written and not appear in report. <eval-expression> Description: A valid eval expression that evaluates to a Boolean. Description: You can search for string values, number values, or phrases in your data. I found here several examples how to match a specific string in an event and only forward that event to the indexer. The Splunk Operator for Kubernetes is a supported platform for deploying Splunk Enterprise with the prerequisites and constraints laid out here. For example you can specify a word such as error, a number such as 404, or a phrase such as Examples of relational operators are equal to ( = ) and is greater than ( > ). It's not foreach that's failing, it's eval interpreting the dot as the concatenation operator. If the computerdisconnected contains any values like "bob or "Tube" then don't return any results. Any particular reason why you are searching for those events and then looking for events that don't meet your search criteria? View solution in original post. Indexer. So I have a field called message which displays the following: Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. This search is looking for a field named "user" that contains the value of "login": Splunk, Splunk>, Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered Dec 5, 2024 · The Splunk Operator runs as a container, and uses the Kubernetes operator pattern and custom resources objects to create and manage a scalable and sustainable Splunk Enterprise environment. Reload to refresh your session. addtotals, stats: A looping operator, performs a search over each search result. I want to dynamically remove a number of columns/headers from my stats. The LIKE operator is similar to the like function. nsc. example of times in the event (referenced a Hello, I'm new to Splunk and am search for an event that would include this: toState: "stateB",", fromState: "stateA" Since the result has double quotes, if I use the above as a search, it will include a variety of events that I don't want to Note that in Splunk when you are including multiple evaluations in a where or eval statement you have to include the boolean AND. The `box:file` contains `file id`, `location` events. com, however this returns all records. Events that do not have a value in the field are not included in the results. If the action field in an event contains any other value, the value Other is placed in the activity field. receiver. If the field name that you specify matches a field name that already exists in the search results, the results of the eval expression overwrite the values in In our environments, we have a standard naming convention for the servers. - does not have to EQUAL that value). SQL users If you're familiar with SQL, see Splunk SPL for SQL users to see how to use your SQL knowledge to learn SPL. Hi Woodcock, We had fixed this issue by following the below solution. For more information about how Splunk software breaks events up into searchable segments, see About segmentation in Getting Data In. This tells Splunk platform to find any event that contains either word. For false you can also specify 'no', the number zero ( 0 ), and variations of the word false, similar to the variations of the word true. search Description. splunk. Logical operators. In this in-depth SOC explainer, we’ll look at: What a SOC does and why; Types of SOCs; The security pros who support SOCs; Tools & technologies I have two logs below, log a is throughout the environment and would be shown for all users. I have a log with content like this: field number1: value1, Application Server=running, Database Server=running When I try these searches: Server="running" works fine, but with 'Application Server'="running" or "A The following list contains the functions that you can use to return information about a value. My current splunk The splunk eval if contains function can be used to perform a variety of tasks, such as: Checking if a specific value exists in a field; Filtering data based on the presence or absence of a substring; Validating input data; Syntax of the In Splunk search query how to check if log message has a text or not? Log message: message: 2018-09-21T07:15:28,458+0000 comp=hub-lora-ingestor-0 [vert. If the action field in an event contains the value addtocart or purchase, The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. The App Source folder adminApps contains Splunk apps that are installed and run on the cluster manager, and will use a local scope. I was just wondering, what does the operator "OR" mean in splunk, does it have a different meaning? for example, am i using it correct in this instance: host = x OR host = y | Futhermore, I was told the key word "WHERE" has a different Wish Granted!!! In Splunk 6. Erfahren Sie, wie die einheitliche Security- und Observability-Plattform von Splunk im Vergleich zu anderen Anbietern abschneidet When it comes to your cybersecurity and daily security operations, a security operations center (SOC) acts as the hub, the central place for all these activities. E. You can configure most of these operations through Splunk Web, although some configuration options are available only by How can I run a search if a field contains the "|" character? hsu88888. Use of AND operator in splunk search Splunk search supports use of boolean operator in splunk. Use the search command to retrieve events from indexes or filter the results of a previous search command in the pipeline. If a Splunk Operator release changes the custom resource (CRD) API version, the administrator is responsible for updating their Custom Resource specification to reference the latest CRD API version. The Splunk search not contains operator can be used to exclude specific terms from a search. applies to. keepevicted Syntax: keepevicted=<bool> Foreach fails if field contains colon or dot. Explorer 09-20-2017 11:19 AM. Arithmetic operators. 2. When a search contains a subsearch, the Splunk software processes the subsearch first as a distinct search job. Your post helped me a lot! I just post shortly my Set the attribute com. case(<condition>,<value Description: A valid search expression that contains quotes. tsidx file. How to use the NOT operator for combination of two words. Notice the name change from 1. This guide is intended to help new users get up and running with the Splunk Operator for Kubernetes. The result of the expression is either TRUE or FALSE. 10. Numbers are concatenated in their string represented form. conf to convert the additional fields to a human-readable time for indexing. Using the On the other hand, NOT is an operator that returns every event except the events that contain the value you specify. How do I use the "AND" operator or any other way to list all values of a field that have both statuses FAIL and Does your events really contain both fields like TransactionStatus=fail and TransactionStatus=success in the same one the Splunk Threat Research Team had 1 release of new security content via the Enterprise I need to create a report to show the processing time of certain events in splunk and in order to do that I need to get get all the relevant events and group by a id. Let's say in /var/log/me I need to create a report to show the processing time of certain events in splunk and in order to do that I need to get get all the relevant events and group by a id. However, those same configurations cannot contain fields that are derived by operations that follow them in the sequence. Note: We recommended that the Splunk Enterprise Splunk contains three processing components: The Indexer parses and indexes data added to Splunk. Splunk: Find events that don't have a certain attribute logged as different log Hello Kristian Thank you for your reply. 1 10. Examples of the Splunk search not contains operator. 8. By using the NOT operator, you can refine your searches and get more The following list contains the functions that you can use to compare values or specify conditional statements. This follows best security practices, helping prevent malicious actors from escalating access beyond the container and compromising the host. Another problem is the unneeded timechart command, which filters out the My current search (below) returns 3 results that has a field called "import_File" that contains either the text "Account", "Owner", or "Member" in the file path. Each of the following operators accepts two numbers and produces a number. I need to create a report to show the processing time of certain events in splunk and in order to do that I need to get get all the relevant events and group by a id. I only need times for users in log b. Using the Feb 20, 2024 · LIKE operator. Hello, Combine the power of AppDynamics and Splunk Cloud Platform to pinpoint issues faster in traditional and hybrid With the IN operator, you can specify the field and a list of values. You switched accounts on another tab or window. 1 192. Basic Search offers a shorthand for simple keyword searches in a body of indexed data myIndex without further If the action field in an event contains the value addtocart or purchase, the value Purchase Related is placed in the activity field. For information about Boolean operators, such as AND and OR, see Boolean operators. The AND, OR, and XOR operators accept two Boolean values. In my log I need to eliminate the errors by considering the combination of the words. The most common use of the OR operator is to find multiple values in event data, for example, foo OR bar. hono. You cannot specify a wild card for the field name. e. I figured out where my failure was in the configuration. I'm trying to search for a parameter that contains a valuebut is not limited to ONLY that value (i. For example, Front End servers: AppFE01_CA, AppFE02_NY Middle tier servers: AppMT01_CA, AppFE09_NY Back End servers: AppBE01_CA, AppBE08_NY If the source contains the cpus information for all these servers, how can I use eval Hi Splunkers I'm new to splunk and currently playing around with the heavy forwarder. Computes an event that contains sum of all numeric fields for previous events. 3 image with it. Use the LIKE operator to match a pattern. But this does not work | where "P-CSCF*">4 Sample Output: Say for example I just wanted to remove the columns P-CSCF-02 & P-CSCF-06 and have P-CSCF if i want to add multiple values in the version field, can i use "AND" operator in search command? for eg: | search version= 10 AND 12 AND 13 or how to include all three values in version field? 0 Karma Reply. You can retrieve events from your indexes, using keywords, quoted phrases, wildcards, and field-value expressions. Supported logical operators Learn how to use the Splunk NOT operator to exclude results from your searches. csv where command | fields command ] Basically I have a lookup table that includes some Linux commands and I want to compare it with command fields from the origin log source. The search command is implied at the beginning of any search. An indexer is the Splunk instance that indexes data. x-eventloop-thread-0] INFO com. Splunk im Vergleich. 3. Führende Unternehmen weltweit nutzen Splunk, um die Sicherheit und Zuverlässigkeit ihrer digitalen Systeme zu erhalten. Other variations are accepted. 12. Splunk Enterprise Security is a fantastic tool that offers robust What's a scalable to extract key-value pairs where the value matches via exact or substring match but the field is not known ahead of time, and could be in _raw only? Eg, search for the string "alan", which may be associated to fields as follows: index=indexA user=alan index=indexB username=alan in I have two fields, application and servletName. "%"), "Monitored", "Not Monitored") Also here is another example I used within the same search. The order in which predicate expressions are While it's probably safe to use NOT host="foo*" since the host field should always exist, I'd favor the host!="foo*" syntax; if you have a pattern you're matching on, you probably expect that field to exist in the results. The indexer transforms the raw data into events and stores the events into an index. 58. The <>, <=, !=, and == operators Syntax Data type Notes <bool> boolean Use true or false. host=datahost where "Emp Code"=FCH OR "Emp Code"=ABC host=datahost "Emp Code"=FCH OR "Emp Code"=ABC host=datahost "Emp Code"=(FCH ABC) Can you help pls. The where search operation lets you compare variables or even eval expressions, but search only looks for literal values. conf file on your behalf. Keep in mind that if you're editing the XML, you do need to substitute < and > with < and > In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue? (This is the first of a series of 2 blogs). What you need is (as alluded above) to wrap the whole string in quotes: Hey everyone. The Splunk Operator is responsible for configuring and maintaing the connection between the cluster manager and the index cluster peers, but it does not manage Splunk Apps. 6 - Search command supports IN operator. To work around I am using a regex to select only records starting with * or #, and then I am trying to use a case statement in eval to figure out what type of feature is being used by our customer. dqezgga nwezjq ghyny artdvzj fal rwjbfbb iwjcf sfhhvmv zunvjio fdlqktb