<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Custom field from an event is not being parsed correctly in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744558#M241273</link>
    <description>&lt;P class=""&gt;Hi, We are using the event field message in our alert, but in some cases, the field is not being parsed correctly. For example, in the attached screenshot, the source event contains the full text in raw format, i.e., message="The full message". However, when we check the Event under the &lt;STRONG&gt;Action&lt;/STRONG&gt; tab, it only shows the first word of the message — "The" — which results in incorrect information being sent in alerts.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-21 at 2.19.07 PM(2).png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38668i357F83C054F789AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-04-21 at 2.19.07 PM(2).png" alt="Screenshot 2025-04-21 at 2.19.07 PM(2).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;Could someone please help us resolve this issue? I appreciate any help you can provide.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Apr 2025 09:57:58 GMT</pubDate>
    <dc:creator>bilalzaib</dc:creator>
    <dc:date>2025-04-21T09:57:58Z</dc:date>
    <item>
      <title>Custom field from an event is not being parsed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744558#M241273</link>
      <description>&lt;P class=""&gt;Hi, We are using the event field message in our alert, but in some cases, the field is not being parsed correctly. For example, in the attached screenshot, the source event contains the full text in raw format, i.e., message="The full message". However, when we check the Event under the &lt;STRONG&gt;Action&lt;/STRONG&gt; tab, it only shows the first word of the message — "The" — which results in incorrect information being sent in alerts.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-21 at 2.19.07 PM(2).png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38668i357F83C054F789AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-04-21 at 2.19.07 PM(2).png" alt="Screenshot 2025-04-21 at 2.19.07 PM(2).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;Could someone please help us resolve this issue? I appreciate any help you can provide.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 09:57:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744558#M241273</guid>
      <dc:creator>bilalzaib</dc:creator>
      <dc:date>2025-04-21T09:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Custom field from an event is not being parsed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744560#M241274</link>
      <description>&lt;P&gt;What sourcetype and extraction configuration are you using?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 10:19:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744560#M241274</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-04-21T10:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Custom field from an event is not being parsed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744565#M241278</link>
      <description>&lt;P&gt;The logs are coming from a Django application, and the sourcetype is set to the name of the application (as shown by&amp;nbsp;| metasearch sourcetype=* command). This is how we are sending logs from the application&lt;/P&gt;&lt;LI-CODE lang="python"&gt;logger.info('Carrier updates summary; message="The following updates message", user="john_doe", carrier_slug="example_carrier"')&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;We are using below query for extraction&lt;/P&gt;&lt;LI-CODE lang="python"&gt;((host="*.prod.domain.com" "Carrier updates summary;") 
OR 
(index=prod_index_eks kub.pod_name="domain-*" log="*Carrier updates summary;*"))
| eval message=coalesce(message, log)
| table message&lt;/LI-CODE&gt;&lt;P class=""&gt;&lt;BR /&gt;I hope this provides some context about our logs. Apologies if it doesn’t — I’m still very new to Splunk. I really appreciate your help!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 10:55:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744565#M241278</guid>
      <dc:creator>bilalzaib</dc:creator>
      <dc:date>2025-04-21T10:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Custom field from an event is not being parsed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744566#M241279</link>
      <description>&lt;P&gt;Assuming you have admin access, you can find the source types under the settings menu option. From this you can find out what extractions are configured, as I suspect these aren't dealing with your custom field as you expect.&lt;/P&gt;&lt;P&gt;You could also try using the extract command&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;((host="*.prod.domain.com" "Carrier updates summary;") 
OR 
(index=prod_index_eks kub.pod_name="domain-*" log="*Carrier updates summary;*"))
| extract
| eval message=coalesce(message, log)
| table message&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 21 Apr 2025 11:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-field-from-an-event-is-not-being-parsed-correctly/m-p/744566#M241279</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-04-21T11:25:20Z</dc:date>
    </item>
  </channel>
</rss>

