Splunk Search

Highlighting a field in the events output

whywhywhy
Engager

I have a search that is looking pipes through a rex.

rex fields=_raw "\D(?<big_num>\d{15,16})\D"

I want the UI to highlight the values identified as feild type big_num in the events log. Is there a way to do this?

Tags (2)

ftk
Motivator

You can use the highlight and iconify search commands in order highlight specific words or fields in your events.

0 Karma

simuvid
Splunk Employee
Splunk Employee

Hi There,

what you can do is extract a custom field for the value in the events you are looking for.

See documentation here:

http://www.splunk.com/base/Documentation/4.1.4/User/ExtractNewFields

When you add the field to your UI from the field picker on the left hand side, the value is shown and also highlighted.

Hope that's what you are looking for.

Cheers,

Christian

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...