Splunk Search

How to search and filter by a field that contains spaces?

teknet7
Engager

Hello Team,

I could see a lot of discussions on this forum, but none solving my issue.

I have a log with content like this:

field number1: value1, Application Server=running, Database Server=running

When I try these searches:
Server="running" works fine, but with 'Application Server'="running" or "Application Server"="running" it's not. How can I filter by value of a field which has a space? I need to have logs with Application Server running (not Database Server running).

Thanks,
Michal

JL99
Explorer

You should able to do that with enclosing your field name with dollar sign ($)

$Application Server$="running"


Refer to: https://community.splunk.com/t5/Splunk-Search/Search-field-names-with-spaces-in-map-command-inner-se...

0 Karma

jsven7
Communicator

If you're looking for events with Server fields containing "running bunny", this works for me:

Server=*"running bunny"*

sjohnson_splunk
Splunk Employee
Splunk Employee

When you view the raw events in verbose search mode you should see the field names. What is the field name? If it is just "server" you should consider creating either an EXTRACT or REPORT in the props.conf for that source or sourcetype.

Get Updates on the Splunk Community!

Pro Tips for First-Time .conf Attendees: Advice from SplunkTrust

Heading to your first .Conf? You’re in for an unforgettable ride — learning, networking, swag collecting, ...

Raise Your Skills at the .conf25 Builder Bar: Your Splunk Developer Destination

Calling all Splunk developers, custom SPL builders, dashboarders, and Splunkbase app creators – the Builder ...

Hunt Smarter, Not Harder: Discover New SPL “Recipes” in Our Threat Hunting Webinar

Are you ready to take your threat hunting skills to the next level? As Splunk community members, you know the ...