Splunk Search

Retrieve result from list

Nidd
Path Finder

I have a field in log like:

"policies":["Test1"]

for which I am not able to search through the keyword when I have the query:

index=myindex host=myhost policies=Test1

 

Since policies is a list and I cant be able to directly search it.

Is there any specific way I can search for inputs available in a list?

Labels (1)
0 Karma
1 Solution

scelikok
SplunkTrust
SplunkTrust

Hi @Nidd,

Can you please try below;

index=myindex host=myhost policies{}=Test1
If this reply helps you an upvote and "Accept as Solution" is appreciated.

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

based on your example you probably have an event which is JSON or partially has JSON? Then you could do e.g.

index=_internal earliest=-1m
| head 1
| eval _raw = "{\"policies\":[\"Test1\"]}"
```previous generate example event```
| spath
| search policies{} = "Test1"

 

Your event is something like this in JSON format:

{"policies":[
  "Test1"
]}

 

0 Karma

Nidd
Path Finder

Thank you @isoutamo 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @Nidd,

Can you please try below;

index=myindex host=myhost policies{}=Test1
If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

Nidd
Path Finder

Thank you @scelikok 

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...