Getting Data In

How to avoid influence of equal sign in text string when Splunk HEC parses JSON?

cdp_fap
Observer

I was tring to ingest data into Splunk via HEC. One field of my data is:

myKey1 = " This is my Application message log, myKey2=myValue2 in the text."  There is a Key=VALUE enclosed in the value of Field_name.

Splunk will parse the data into two key:

myKey1 = " This is my Application message log, KEY=VALUE in the text." 

myKey2=myValue2

myKey2=myValue2 is part of the myKey1.

 

I don't want it. What I can do to avoid the influence of an equal sign in the text string?

 

Labels (1)
0 Karma

dural_yyz
Motivator

Question: Have you attempted the same search SPL in 'Fast Mode' vs 'Smart or Verbose Modes'.   Part of the power of Splunk is how much it tries to help you.  In this case the Search Head may be trying to auto detect fields for the user.

You could if required reduce the length of the event which field discovery will attempt, I believe default is ~10,000 characters to something much lower.  However, I think that would overall be a poorer experience for your user base.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...