I have some new logs coming in, and I took a look at the fieldname that has a Windows filename in it, and it is being truncated after the space character (if there happens to be one).
The events are coming in via DB Connect, multiline, and I can see the whole filename in the _raw event:
source_file=//home.local/home/caddev/usernameish/temp deck overview.pptx
So the event is indexing fine, but when I search, and Splunk does it's generic field extraction, the source_file field turns into:
Is there a quick way to fix this?
The raw file is multiline events OR everything is coming in single line? Does the file name always contain extension of the file??
you need to build the extraction for that. A quick way is to use the extract fields in the event actions.
Check these splunk docs:
The extract fields utility is broken in my install. I'll have to investigate further, but for now it is erroring out.