Splunk Search

How to show only Certain Fields of the Events in the Search Results?

Kyle_Brandt
Path Finder

How do I search and then show only show certain fields for each event?

I tried: remoteaccess host="ny-vpn" | fields Message but this seems to only restrict the fields that are listed on the left part of the page, not the actual results. I also tried ... | fields Message | fields - _* but then I only get the date.

This is for WinEventLog items sent by the light forwarder.

1 Solution

Ayn
Legend

You can also use the table command to have Splunk show a table containing the fields you want:

remoteaccess host="ny-vpn" | table Message

View solution in original post

Ayn
Legend

You can also use the table command to have Splunk show a table containing the fields you want:

remoteaccess host="ny-vpn" | table Message

maverick
Splunk Employee
Splunk Employee

Try

 remoteaccess host="ny-vpn" | fields + Message

then use the Pick Fields link on the left to pick the fields and save.

Then click the "Event Table" box-looking icon just above the results (the center one) and that should then only show the timestamp and the Message field.

Also, you can save the search and then add it to a dashboard as a "Data Table" type and, then it will ONLY show the timestamp and the Message field by default

Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...