Knowledge Management

stats & table truncating the field value

RSS_STT
Explorer

Raw message showing the correct filed value but stats & table truncating the field value.

RAW meassge:

Message=" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server "RO76 is currently down / unreachable."

Table & Stats showing:

Message=| RO76 | PXS (DTI) - Server - Windows Server Down Critical | Server

it breaking after " sign.

Labels (1)
Tags (1)
0 Karma
1 Solution

livehybrid
SplunkTrust
SplunkTrust

Hi @RSS_STT 
It is breaking because it is treating the double quotes as the end of the string. Is Message=* the last part of your event, or is there more text after the message?

If its always the last part of the event then you could use the following rex command to create a new "fullMessage" field:

| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 

See screenshot of an example:

livehybrid_0-1745961061180.png

 

| windbag | head 1 
| eval _raw="User=testing Message=\" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server \"RO76 is currently down / unreachable.\""
| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 
| table _time fullMessage

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

View solution in original post

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @RSS_STT 
It is breaking because it is treating the double quotes as the end of the string. Is Message=* the last part of your event, or is there more text after the message?

If its always the last part of the event then you could use the following rex command to create a new "fullMessage" field:

| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 

See screenshot of an example:

livehybrid_0-1745961061180.png

 

| windbag | head 1 
| eval _raw="User=testing Message=\" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server \"RO76 is currently down / unreachable.\""
| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 
| table _time fullMessage

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Your question is a bit skimpy on details but I assume that your event contains a string

Message=" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server "RO76 is currently down / unreachable."

somewhere within its contents.

And I suspect you're using the value of a field Message which is (probably automatically) extracted from your event. And this field is "truncated".

Most probably it's due to either (depending on how you look at it) badly/not defined extractions or badly formatted data. Splunk apparently uses key="value" format to find field(s) in your raw data. Since your value contains a quote, this quote delimits the value of the field. Depending on your data you might be able to define extraction catching the whole string if you can anchor the regex somewhere after that string. But as a general rule you should not have data containing unescaped delimiter.

Get Updates on the Splunk Community!

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...