<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Searching for text in a field using a wild card in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712485#M240342</link>
    <description>&lt;P&gt;No how would i do that? spath?&lt;/P&gt;</description>
    <pubDate>Tue, 25 Feb 2025 14:36:33 GMT</pubDate>
    <dc:creator>nkavouris</dc:creator>
    <dc:date>2025-02-25T14:36:33Z</dc:date>
    <item>
      <title>Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712402#M240333</link>
      <description>&lt;P&gt;I have a field message in _raw that looks something like this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;"message":"test::hardware_controller: &lt;STRONG&gt;Unit state update from cook client target&lt;/STRONG&gt;: Elements(temp: -, [F: 255, F: 255, F: 255, F: 255, F: 255, F: 255]), hw_state: Elements(temp: -, [F: 255, F: 255, F: 255, F: 255, F: 255, F: 255])"&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;I am looking to search for messages containing the bold section. , but when i search:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE&gt;index="sample_idx" $serialnumber$ log_level=info message=*Unit state update from cook client target*|&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;this returns no results, even though I know events containing the wildcard phrase are present within the query index and timeframe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 22:11:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712402#M240333</guid>
      <dc:creator>nkavouris</dc:creator>
      <dc:date>2025-02-24T22:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712406#M240336</link>
      <description>&lt;P&gt;This looks like json - has the event been ingested as json and the message field already been extracted?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 00:07:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712406#M240336</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-02-25T00:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712407#M240337</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;try to enclose message=*Unit state update from cook client target* with double quote like this&lt;/P&gt;&lt;P&gt;message="*Unit state update from cook client target*".&lt;/P&gt;&lt;P&gt;I think the problem is white space between unit, state, ...,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope ti help&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 00:16:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712407#M240337</guid>
      <dc:creator>myitlab42000</dc:creator>
      <dc:date>2025-02-25T00:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712411#M240338</link>
      <description>&lt;P&gt;Second what&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;says. &amp;nbsp;If the raw event is not completely in JSON, the event must have included a JSON message. &amp;nbsp;In that case, Splunk would not have extracted JSON fields. &amp;nbsp;But it is strongly recommended that you treat structured data as structured data and do not use regex to extract from them. &amp;nbsp; The way to do this is to extract the JSON part into its own field so you can make structured extraction. &amp;nbsp;Please post sample of complete event.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 03:24:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712411#M240338</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-02-25T03:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712485#M240342</link>
      <description>&lt;P&gt;No how would i do that? spath?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 14:36:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712485#M240342</guid>
      <dc:creator>nkavouris</dc:creator>
      <dc:date>2025-02-25T14:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712486#M240343</link>
      <description>&lt;P&gt;It depends on your complete raw event - spath is likely to be part of the solution. Please share your raw event (anonymised appropriately) in a code block using the &amp;lt;/&amp;gt; button.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 14:47:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712486#M240343</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-02-25T14:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712496#M240344</link>
      <description>&lt;P&gt;here is the raw event&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;bootcount&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:8&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;device_id&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;XXXX&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;environment&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;prod_walker&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;event_source&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;appliance&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;event_type&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;GENERIC&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;local_time&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;2025-02-20T00:34:58.406-06:00&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;BR /&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;location&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;city&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;XXXX&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;country&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;XXXX&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;latitude&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:XXXX&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;longitude&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:XXXX&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;state&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;XXXX&lt;/SPAN&gt;&lt;SPAN&gt;"},"&lt;/SPAN&gt;&lt;SPAN class=""&gt;log_level&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;info&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;BR /&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;message&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;martini::hardware_controller:&lt;/SPAN&gt; Unit &lt;SPAN class=""&gt;state&lt;/SPAN&gt; &lt;SPAN class=""&gt;update&lt;/SPAN&gt; &lt;SPAN class=""&gt;from&lt;/SPAN&gt; &lt;SPAN class=""&gt;cook&lt;/SPAN&gt; &lt;SPAN class=""&gt;client&lt;/SPAN&gt; &lt;SPAN class=""&gt;target:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Elements&lt;/SPAN&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;SPAN class=""&gt;temp:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;, [&lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;F:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;SPAN&gt;]), &lt;/SPAN&gt;&lt;SPAN class=""&gt;hw_state:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Elements&lt;/SPAN&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;SPAN class=""&gt;temp:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;, [&lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;D&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;F:&lt;/SPAN&gt; &lt;SPAN class=""&gt;115&lt;/SPAN&gt;&lt;SPAN&gt;])&lt;/SPAN&gt;&lt;SPAN class=""&gt;\u0000&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;BR /&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;model_number&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"XXXX&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;sequence&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:372246&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;serial&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;XXXX&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;software_version&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;2.3.0.276&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;ticks&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;timestamp&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:1740033298&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class=""&gt;timestamp_ms&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:1740033298406}&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 25 Feb 2025 16:12:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712496#M240344</guid>
      <dc:creator>nkavouris</dc:creator>
      <dc:date>2025-02-25T16:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712505#M240351</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| spath
| search message="*Unit state update from cook client target*"&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 25 Feb 2025 17:18:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712505#M240351</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-02-25T17:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712522#M240353</link>
      <description>&lt;P&gt;this does not work as I understand it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;index="mysearch" log_level=info|&lt;BR /&gt;spath|&lt;BR /&gt;search message="*Unit state update from cook client target*"&lt;/PRE&gt;&lt;P&gt;in fact it makes my search much slower, while still not yielding any results&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 19:52:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712522#M240353</guid>
      <dc:creator>nkavouris</dc:creator>
      <dc:date>2025-02-25T19:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712523#M240354</link>
      <description>&lt;P&gt;This works for certain strings, but not others, does whitespace before or after the desired string in the event effect it?&lt;BR /&gt;&lt;BR /&gt;If I use the string descried above, this solution works, but with a different string it does not work. what gives?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 20:03:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712523#M240354</guid>
      <dc:creator>nkavouris</dc:creator>
      <dc:date>2025-02-25T20:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712556#M240360</link>
      <description>&lt;P&gt;Are you sure those bare XXXX are not quoted, like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{"bootcount":8,"device_id":"XXXX","environment":"prod_walker","event_source":"appliance","event_type":"GENERIC","local_time":"2025-02-20T00:34:58.406-06:00",
"location":{"city":"XXXX","country":"XXXX","latitude":"XXXX","longitude":"XXXX","state":"XXXX"},"log_level":"info",
"message":"martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])\u0000",
"model_number":"XXXX","sequence":372246,"serial":"XXXX","software_version":"2.3.0.276","ticks":0,"timestamp":1740033298,"timestamp_ms":1740033298406}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, a "normal" Splunk instance should have given you message as a field with value "&lt;SPAN&gt;martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If, for whatever reason your instance doesn't, &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath" target="_blank" rel="noopener"&gt;spath&lt;/A&gt; command suffices. &amp;nbsp;Try this example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw = "{\"bootcount\":8,\"device_id\":\"XXXX\",\"environment\":\"prod_walker\",\"event_source\":\"appliance\",\"event_type\":\"GENERIC\",\"local_time\":\"2025-02-20T00:34:58.406-06:00\",
\"location\":{\"city\":\"XXXX\",\"country\":\"XXXX\",\"latitude\":\"XXXX\",\"longitude\":\"XXXX\",\"state\":\"XXXX\"},\"log_level\":\"info\",
\"message\":\"martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])\\u0000\",
\"model_number\":\"XXXX\",\"sequence\":372246,\"serial\":\"XXXX\",\"software_version\":\"2.3.0.276\",\"ticks\":0,\"timestamp\":1740033298,\"timestamp_ms\":1740033298406}"
| eval _time = json_extract(_raw, "timestamp")
``` data emulation above ```
| spath
| table message&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hint: output is&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN&gt;Alternatively, use &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/JSONFunctions#json_extract.28.26lt.3Bjson.26gt.3B.2C_.26lt.3Bpaths.26gt.3B.29" target="_blank" rel="noopener"&gt;json_extract&lt;/A&gt; function if your Splunk is 8.1 or later. &amp;nbsp;Try this example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw = "{\"bootcount\":8,\"device_id\":\"XXXX\",\"environment\":\"prod_walker\",\"event_source\":\"appliance\",\"event_type\":\"GENERIC\",\"local_time\":\"2025-02-20T00:34:58.406-06:00\",
\"location\":{\"city\":\"XXXX\",\"country\":\"XXXX\",\"latitude\":\"XXXX\",\"longitude\":\"XXXX\",\"state\":\"XXXX\"},\"log_level\":\"info\",
\"message\":\"martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])\\u0000\",
\"model_number\":\"XXXX\",\"sequence\":372246,\"serial\":\"XXXX\",\"software_version\":\"2.3.0.276\",\"ticks\":0,\"timestamp\":1740033298,\"timestamp_ms\":1740033298406}"
| eval _time = json_extract(_raw, "timestamp")
``` data emulation above ```
| eval message = json_extract(_raw, "message")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your instance is older, you can also use &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/TextFunctions#spath.28.26lt.3Bvalue.26gt.3B.2C.26lt.3Bpath.26gt.3B.29" target="_blank" rel="noopener"&gt;spath&lt;/A&gt; function. &amp;nbsp;Try this example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw = "{\"bootcount\":8,\"device_id\":\"XXXX\",\"environment\":\"prod_walker\",\"event_source\":\"appliance\",\"event_type\":\"GENERIC\",\"local_time\":\"2025-02-20T00:34:58.406-06:00\",
\"location\":{\"city\":\"XXXX\",\"country\":\"XXXX\",\"latitude\":\"XXXX\",\"longitude\":\"XXXX\",\"state\":\"XXXX\"},\"log_level\":\"info\",
\"message\":\"martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])\\u0000\",
\"model_number\":\"XXXX\",\"sequence\":372246,\"serial\":\"XXXX\",\"software_version\":\"2.3.0.276\",\"ticks\":0,\"timestamp\":1740033298,\"timestamp_ms\":1740033298406}"
| eval _time = spath(_raw, "timestamp")
``` data emulation above ```
| eval message = spath(_raw, "message")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 03:56:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712556#M240360</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-02-26T03:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712557#M240361</link>
      <description>&lt;P&gt;Your search is slower compared with what? &amp;nbsp;You don't need to run spath according to my analysis. &amp;nbsp;Because Splunk has already extracted it, running spath simply wastes CPU and memory. &amp;nbsp; But running a search with leading wildcard always slows things down considerably. (The way you try to use regex doesn't make things better.) &amp;nbsp;Why do you need wildcards, anyway? &amp;nbsp;Your search can be conducted in bare terms without considering the field. &amp;nbsp;Try&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="sample_idx" $serialnumber$ log_level=info
  Unit state update from cook client target&lt;/LI-CODE&gt;&lt;P&gt;Here's an emulation for you to play with and compare with real data&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw = "{\"bootcount\":8,\"device_id\":\"XXXX\",\"environment\":\"prod_walker\",\"event_source\":\"appliance\",\"event_type\":\"GENERIC\",\"local_time\":\"2025-02-20T00:34:58.406-06:00\",
\"location\":{\"city\":\"XXXX\",\"country\":\"XXXX\",\"latitude\":\"XXXX\",\"longitude\":\"XXXX\",\"state\":\"XXXX\"},\"log_level\":\"info\",
\"message\":\"martini::hardware_controller: Unit state update from cook client target: Elements(temp: -, [D, D, D, D, D, F: 0]), hw_state: Elements(temp: -, [D, D, D, D, D, F: 115])\\u0000\",
\"model_number\":\"XXXX\",\"sequence\":372246,\"serial\":\"XXXX\",\"software_version\":\"2.3.0.276\",\"ticks\":0,\"timestamp\":1740033298,\"timestamp_ms\":1740033298406}"
| eval _time = json_extract(_raw, "timestamp")
| spath
``` the abovee emulates
index="sample_idx" $serialnumber$ log_level=info
```
| search Unit state update from cook client target&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 04:13:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712557#M240361</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-02-26T04:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for text in a field using a wild card</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712658#M240383</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;can you try this :&lt;/P&gt;&lt;P&gt;index="sample_idx" $serialnumber$ log_level=info | regex message="(?:Unit[\s]+state[\s]+update[\s]+from[\s]+cook[\s]+client[\s]+target)"&lt;/P&gt;&lt;P&gt;this try to filter data that contains the bold text with words separated by one or more space.&lt;/P&gt;&lt;P&gt;is that what you are looking for ?&lt;/P&gt;&lt;P&gt;i'm sorry if i misunderstand&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 23:38:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-text-in-a-field-using-a-wild-card/m-p/712658#M240383</guid>
      <dc:creator>myitlab42000</dc:creator>
      <dc:date>2025-02-26T23:38:13Z</dc:date>
    </item>
  </channel>
</rss>

