As pod is an indexed field you have to configure fields.conf or search bei pod::mypod..
it's stated in the documentation:
"Splunk Connect for Kubernetes sends events to Splunk which can contain extra meta-data attached to each event. Metadata values such as "pod", "namespace", "container_name","container_id", "cluster_name" will appear as fields when viewing the event data inside Splunk. There are two solutions for running searches in Splunk on meta-data.
Modify search to usefieldname::valueinstead offieldname=value.
Configurefields.confon your downstream Splunk system to have your meta-data fields available to be searched usingfieldname=value. Example:fields.conf.example