Knowledge Management

stats & table truncating the field value

RSS_STT
Explorer

Raw message showing the correct filed value but stats & table truncating the field value.

RAW meassge:

Message=" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server "RO76 is currently down / unreachable."

Table & Stats showing:

Message=| RO76 | PXS (DTI) - Server - Windows Server Down Critical | Server

it breaking after " sign.

Labels (1)
Tags (1)
0 Karma
1 Solution

livehybrid
SplunkTrust
SplunkTrust

Hi @RSS_STT 
It is breaking because it is treating the double quotes as the end of the string. Is Message=* the last part of your event, or is there more text after the message?

If its always the last part of the event then you could use the following rex command to create a new "fullMessage" field:

| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 

See screenshot of an example:

livehybrid_0-1745961061180.png

 

| windbag | head 1 
| eval _raw="User=testing Message=\" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server \"RO76 is currently down / unreachable.\""
| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 
| table _time fullMessage

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

View solution in original post

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @RSS_STT 
It is breaking because it is treating the double quotes as the end of the string. Is Message=* the last part of your event, or is there more text after the message?

If its always the last part of the event then you could use the following rex command to create a new "fullMessage" field:

| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 

See screenshot of an example:

livehybrid_0-1745961061180.png

 

| windbag | head 1 
| eval _raw="User=testing Message=\" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server \"RO76 is currently down / unreachable.\""
| rex field=_raw "Message\=\"(?<fullMessage>.+)\"$" 
| table _time fullMessage

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Your question is a bit skimpy on details but I assume that your event contains a string

Message=" | RO76 | PXS (XITI) - Server - Windows Server Down Critical | Server "RO76 is currently down / unreachable."

somewhere within its contents.

And I suspect you're using the value of a field Message which is (probably automatically) extracted from your event. And this field is "truncated".

Most probably it's due to either (depending on how you look at it) badly/not defined extractions or badly formatted data. Splunk apparently uses key="value" format to find field(s) in your raw data. Since your value contains a quote, this quote delimits the value of the field. Depending on your data you might be able to define extraction catching the whole string if you can anchor the regex somewhere after that string. But as a general rule you should not have data containing unescaped delimiter.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...