R1D38 SOQL and SOSL Queries in Apex
I’m working through the Apex Basics & Database module on Trailhead.
I learned about using built in sObjects and also about making custom sObjects. Next I learned about how to use DML in order to manipulate records within the system. After getting the basics down we dove into SOQL.
SOQL
SOQL is shot for Salesforce Object Query Language. If you are familiar with SQL you will feel right at home. SOQL makes querying data very simple. One pretty poweful feature is the ability to run inline queries and return the results to a variable. In pretty much every other language you would need to create a cursor and iterate over the results in order to read the values from a database. In SOQL you simply assing the results to an array.# Python Exampleconn = sqlite3.connect(’example.db’) c = conn.cursor() results = c.execute(“SELECT Name, Phone FROM Accounts”)
for row in results: print row
# SOQL Example Accounts[] accts = [SELECT Name, Phone FROM Account];
I think this bit trips up a lot of new programmers so it is great to see how SOQL makes it easy.
One thing worth noting is that you canno use the handy “SELECT *” that is found in SQL.
Unlike other SQL languages, you can’t specify * for all fields. You must specify every field you want to get explicitly. If you try to access a field you haven’t specified in the SELECT clause, you’ll get an error because the field hasn’t been retrieved.The built in developer console in Salesforce makes it very easy to run queries and inspect your objects without writing any additional code.
Cool things about SOQL:
- you can pass in variables directly into a query
- you can use dot notation to get related records in a query
- you can use for loops in queries
SOSL
SOSL is short for Salesforce Object Search Language and it allows you to do robust full text search on records similar to Apache Lucene. The main difference is that it allows you to search accross multiple objects instead of just a single one.FIND 'SearchQuery' [IN SearchGroup] [RETURNING ObjectsAndFields]In order to pass a variable into the search query, you use the colon symbol.
public class MultiSearch {
public static List> searchAll (String searchTerm) {
List> searchList = [FIND :searchTerm IN ALL FIELDS RETURNING Account(Name),Contact(FirstName,LastName)];
return searchList;
}
}
Thank you for reading! Share your thoughts with me on bluesky, mastodon, or via email.
Check out some more stuff to read down below.
Most popular posts this month
- SQLite DB Migrations with PRAGMA user_version
- My Custom Miniflux CSS Theme
- Using cgit
- Setting up ANTLR4 on Windows
- Making cgit Pretty
Recent Favorite Blog Posts
This is a collection of the last 8 posts that I bookmarked.
- A eulogy for Vim from Drew DeVault's blog
- Pluralistic: AI "journalists" prove that media bosses don't give a shit (11 Mar 2026) from Pluralistic: Daily links from Cory Doctorow
- Avi Alkalay: Uniqlo T-Shirt Bash Script Easter Egg from Fedora People
- Offline 23 hours a day from Derek Sivers blog
- Pluralistic: California can stop Larry Ellison from buying Warners (28 Feb 2026) from Pluralistic: Daily links from Cory Doctorow
- On Alliances from Smashing Frames
- Acting ethically in an imperfect world from Smashing Frames
- Diffusion of Responsibility from Smashing Frames
Articles from blogs I follow around the net
Changes in the system prompt between Claude Opus 4.6 and 4.7
Anthropic are the only major AI lab to publish the system prompts for their user-facing chat systems. Their system prompt archive now dates all the way back to Claude 3 in July 2024 and it's always interesting to see how the system prompt evolves as they p...
via Simon Willison's Weblog: Entries April 18, 2026You Can Message Me From My Website Now
I came across a rather interesting idea (via Intial Charge): I added a widget to every page here that lets anyone in the world immediately send me a notification. Type a message, hit send, and it’ll...
via Chris Hannah April 18, 2026Rhea Finance exploited for $18.4 million, some recovered
Rhea Finance's lending product was exploited for around $18.4 million after an attacker took advantage of a bug in the platform's slippage protection feature. The stolen assets affected both platform and user funds.Some of the stolen tokens were returned b...
via Web3 is Going Just Great April 18, 2026Generated by openring