Splunk Search

Log format for Splunk key=value

splunkreal
Motivator

Hello guys,

do you advice this log format:

key=value instead of key="value" ? Thanks.

 

* If this helps, please upvote or accept solution 🙂 *
Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

It depends.  K=V is simpler to parse, but if the value contains spaces or commas then it must be quoted.  If you must choose one or the other then go with K="V".

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

It depends.  K=V is simpler to parse, but if the value contains spaces or commas then it must be quoted.  If you must choose one or the other then go with K="V".

---
If this reply helps you, Karma would be appreciated.

kamlesh_vaghela
SplunkTrust
SplunkTrust

Yes @splunkreal 

key="value" will more suggested than  key=value. 

If you go with key=value and in case the value has SPACE then Splunk field auto discovery will consider only first word of that value. In this case you have to write your own field extraction.

Here, I suggest you to create a sample file and index it with sample data (with double quotes and without double quotes) you will get it what is the best way to store value.

 

🙂

KV

 

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...