Splunk Search

Creating new fields and setting values for fields retrieved on search.

misteryuku
Communicator

I put the key value pairs of the log message into the content body whenever i create new events throught the splunk's receiver endpoint, so that i can see new fields being added.

hater = yes, nothater = suck, splunk_server=L33603

splunk_server field was retrieved during serach and i set the value to it. When i sent the data for indexing, the new fields are created but the value of the splunk_server field wasn't the value that i set.

Tags (3)
0 Karma

ben_leung
Builder

Here is a list of splunk default fields you might want to get acquainted with.

http://docs.splunk.com/Documentation/Splunk/6.3.2/Knowledge/Usedefaultfields

0 Karma

the_wolverine
Champion

splunk_server is a reserved field used by Splunk. You should choose non-reserved field names.

You can confirm this by searching any event that does not contain your splunk_server key=value and see that the field exists in every event.

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...