Splunk Search

Creating new fields and setting values for fields retrieved on search.

misteryuku
Communicator

I put the key value pairs of the log message into the content body whenever i create new events throught the splunk's receiver endpoint, so that i can see new fields being added.

hater = yes, nothater = suck, splunk_server=L33603

splunk_server field was retrieved during serach and i set the value to it. When i sent the data for indexing, the new fields are created but the value of the splunk_server field wasn't the value that i set.

Tags (3)
0 Karma

ben_leung
Builder

Here is a list of splunk default fields you might want to get acquainted with.

http://docs.splunk.com/Documentation/Splunk/6.3.2/Knowledge/Usedefaultfields

0 Karma

the_wolverine
Champion

splunk_server is a reserved field used by Splunk. You should choose non-reserved field names.

You can confirm this by searching any event that does not contain your splunk_server key=value and see that the field exists in every event.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...