<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extremely confused with :: vs = in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428749#M6031</link>
    <description>&lt;P&gt;On our forwarders we have a &lt;CODE&gt;[default]&lt;/CODE&gt; &lt;CODE&gt;_meta&lt;/CODE&gt; value that specify a few &lt;CODE&gt;key::value&lt;/CODE&gt; pairs, e.g. a key to tell us what site this server forwarding the data belongs to (e.g. &lt;CODE&gt;site::staging&lt;/CODE&gt;).&lt;/P&gt;

&lt;P&gt;When I search for &lt;CODE&gt;site=staging&lt;/CODE&gt; I get fewer results than with &lt;CODE&gt;site::staging&lt;/CODE&gt;, and I can't seem to find relevant documentation that explains why and it isn't easy to determine &lt;EM&gt;what&lt;/EM&gt; is actually being filtered in the first compared to the latter when I look at the results (no easy/logical at-a-glance answer).&lt;/P&gt;

&lt;P&gt;If I take a specific host and a simple file we monitor, like &lt;CODE&gt;host=someserver source=/var/log/messages&lt;/CODE&gt; - the result set is vastly different, with &lt;CODE&gt;site::staging&lt;/CODE&gt; containing what seems to be the entire log and &lt;CODE&gt;site=staging&lt;/CODE&gt; giving just a few lines from the log (and those lines don't contain text which mention &lt;CODE&gt;staging&lt;/CODE&gt; either).  I can't think of any logic that would dictate why just a few lines seem to match &lt;CODE&gt;site=staging&lt;/CODE&gt; - I'd expect that field to either be searchable or not, not some odd subset of data.  Also the UI highlights the &lt;CODE&gt;source&lt;/CODE&gt; field in the events as matching &lt;CODE&gt;staging&lt;/CODE&gt; when I do &lt;CODE&gt;site::staging&lt;/CODE&gt; which points to it thinking that it knows what I want.  This makes it even more annoying when using the UI to add a field to the search, because when you click the &lt;CODE&gt;site&lt;/CODE&gt; field and "add to search" it adds it as &lt;CODE&gt;site=staging&lt;/CODE&gt; which doesn't yield all the results.&lt;/P&gt;

&lt;P&gt;This is with SplunkCloud if that makes any difference.&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jun 2018 03:21:04 GMT</pubDate>
    <dc:creator>Kindred</dc:creator>
    <dc:date>2018-06-05T03:21:04Z</dc:date>
    <item>
      <title>Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428749#M6031</link>
      <description>&lt;P&gt;On our forwarders we have a &lt;CODE&gt;[default]&lt;/CODE&gt; &lt;CODE&gt;_meta&lt;/CODE&gt; value that specify a few &lt;CODE&gt;key::value&lt;/CODE&gt; pairs, e.g. a key to tell us what site this server forwarding the data belongs to (e.g. &lt;CODE&gt;site::staging&lt;/CODE&gt;).&lt;/P&gt;

&lt;P&gt;When I search for &lt;CODE&gt;site=staging&lt;/CODE&gt; I get fewer results than with &lt;CODE&gt;site::staging&lt;/CODE&gt;, and I can't seem to find relevant documentation that explains why and it isn't easy to determine &lt;EM&gt;what&lt;/EM&gt; is actually being filtered in the first compared to the latter when I look at the results (no easy/logical at-a-glance answer).&lt;/P&gt;

&lt;P&gt;If I take a specific host and a simple file we monitor, like &lt;CODE&gt;host=someserver source=/var/log/messages&lt;/CODE&gt; - the result set is vastly different, with &lt;CODE&gt;site::staging&lt;/CODE&gt; containing what seems to be the entire log and &lt;CODE&gt;site=staging&lt;/CODE&gt; giving just a few lines from the log (and those lines don't contain text which mention &lt;CODE&gt;staging&lt;/CODE&gt; either).  I can't think of any logic that would dictate why just a few lines seem to match &lt;CODE&gt;site=staging&lt;/CODE&gt; - I'd expect that field to either be searchable or not, not some odd subset of data.  Also the UI highlights the &lt;CODE&gt;source&lt;/CODE&gt; field in the events as matching &lt;CODE&gt;staging&lt;/CODE&gt; when I do &lt;CODE&gt;site::staging&lt;/CODE&gt; which points to it thinking that it knows what I want.  This makes it even more annoying when using the UI to add a field to the search, because when you click the &lt;CODE&gt;site&lt;/CODE&gt; field and "add to search" it adds it as &lt;CODE&gt;site=staging&lt;/CODE&gt; which doesn't yield all the results.&lt;/P&gt;

&lt;P&gt;This is with SplunkCloud if that makes any difference.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 03:21:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428749#M6031</guid>
      <dc:creator>Kindred</dc:creator>
      <dc:date>2018-06-05T03:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428750#M6032</link>
      <description>&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/411019/whats-the-difference-between-hostabc-and-hostabc.html"&gt;https://answers.splunk.com/answers/411019/whats-the-difference-between-hostabc-and-hostabc.html&lt;/A&gt;&lt;BR /&gt;
have you seen this answer?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 13:40:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428750#M6032</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2018-06-05T13:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428751#M6033</link>
      <description>&lt;P&gt;It helps from a background of where &lt;CODE&gt;::&lt;/CODE&gt; came from, but doesn't really explain the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 05:14:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428751#M6033</guid>
      <dc:creator>Kindred</dc:creator>
      <dc:date>2018-06-06T05:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428752#M6034</link>
      <description>&lt;P&gt;In terms of syntax, the :: is obviously to use only indexed fields and the = should use indexed or non-indexed as per the documentation&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Search/Writebettersearches#Use_indexed_and_default_fields" target="_blank"&gt;Write better searches : Use_indexed_and_default_fields&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Effectively if you are using = you are looking for something extracted at search time, if you use :: you are looking for an indexed field.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Search/Usefieldstoretrieveevents" target="_blank"&gt;Use fields to retrieve events&lt;/A&gt; from this documentation:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;When searching for default field values and custom indexed field values you can use the standard &amp;lt;field&amp;gt;=&amp;lt;value&amp;gt; syntax. This syntax matches default fields, custom indexed fields, and search-time fields. 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you are not seeing all the results with = but you see it with :: I'd log a support case, have you tested in smart mode and fast mode just in case to see if there is a difference?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:55:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428752#M6034</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2020-09-29T19:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428753#M6035</link>
      <description>&lt;P&gt;Fast Mode vs Smart Mode doesn't make any difference - we'll lodge a support case and I'll update with any answer.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 05:32:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428753#M6035</guid>
      <dc:creator>Kindred</dc:creator>
      <dc:date>2018-06-08T05:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Extremely confused with :: vs =</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428754#M6036</link>
      <description>&lt;P&gt;I'm running into this same issue and have not found a solution.  Was Splunk Support able to help you resolve it?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 21:50:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Extremely-confused-with-vs/m-p/428754#M6036</guid>
      <dc:creator>rxdeleon</dc:creator>
      <dc:date>2019-01-16T21:50:32Z</dc:date>
    </item>
  </channel>
</rss>

