Splunk Search

Custom field from an event is not being parsed correctly

bilalzaib
Engager

Hi, We are using the event field message in our alert, but in some cases, the field is not being parsed correctly. For example, in the attached screenshot, the source event contains the full text in raw format, i.e., message="The full message". However, when we check the Event under the Action tab, it only shows the first word of the message — "The" — which results in incorrect information being sent in alerts.Screenshot 2025-04-21 at 2.19.07 PM(2).png

Could someone please help us resolve this issue? I appreciate any help you can provide.

Labels (2)
0 Karma
1 Solution

bilalzaib
Engager

The logs are coming from a Django application, and the sourcetype is set to the name of the application (as shown by | metasearch sourcetype=* command). This is how we are sending logs from the application

logger.info('Carrier updates summary; message="The following updates message", user="john_doe", carrier_slug="example_carrier"')


We are using below query for extraction

((host="*.prod.domain.com" "Carrier updates summary;") 
OR 
(index=prod_index_eks kub.pod_name="domain-*" log="*Carrier updates summary;*"))
| eval message=coalesce(message, log)
| table message


I hope this provides some context about our logs. Apologies if it doesn’t — I’m still very new to Splunk. I really appreciate your help!

View solution in original post

0 Karma

bilalzaib
Engager

The logs are coming from a Django application, and the sourcetype is set to the name of the application (as shown by | metasearch sourcetype=* command). This is how we are sending logs from the application

logger.info('Carrier updates summary; message="The following updates message", user="john_doe", carrier_slug="example_carrier"')


We are using below query for extraction

((host="*.prod.domain.com" "Carrier updates summary;") 
OR 
(index=prod_index_eks kub.pod_name="domain-*" log="*Carrier updates summary;*"))
| eval message=coalesce(message, log)
| table message


I hope this provides some context about our logs. Apologies if it doesn’t — I’m still very new to Splunk. I really appreciate your help!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Assuming you have admin access, you can find the source types under the settings menu option. From this you can find out what extractions are configured, as I suspect these aren't dealing with your custom field as you expect.

You could also try using the extract command

((host="*.prod.domain.com" "Carrier updates summary;") 
OR 
(index=prod_index_eks kub.pod_name="domain-*" log="*Carrier updates summary;*"))
| extract
| eval message=coalesce(message, log)
| table message
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What sourcetype and extraction configuration are you using?

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...