Splunk Search

How to search and filter by a field that contains spaces?

teknet7
Engager

Hello Team,

I could see a lot of discussions on this forum, but none solving my issue.

I have a log with content like this:

field number1: value1, Application Server=running, Database Server=running

When I try these searches:
Server="running" works fine, but with 'Application Server'="running" or "Application Server"="running" it's not. How can I filter by value of a field which has a space? I need to have logs with Application Server running (not Database Server running).

Thanks,
Michal

JL99
Explorer

You should able to do that with enclosing your field name with dollar sign ($)

$Application Server$="running"


Refer to: https://community.splunk.com/t5/Splunk-Search/Search-field-names-with-spaces-in-map-command-inner-se...

0 Karma

jsven7
Communicator

If you're looking for events with Server fields containing "running bunny", this works for me:

Server=*"running bunny"*

sjohnson_splunk
Splunk Employee
Splunk Employee

When you view the raw events in verbose search mode you should see the field names. What is the field name? If it is just "server" you should consider creating either an EXTRACT or REPORT in the props.conf for that source or sourcetype.

Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...