Hi,
I have a Splunk event "Application -> start of the log".
When I try to search for this log using the exact text then I do not get any results.
I see that the greater than symbol is causing the problem. When I split my search command as "Application -" AND "start of the log" then splunk was able to find the event.
So how do I escape the greater than symbol in splunk search command? I tried > which didn't work.
(I also want to use this search text in "transaction startswith=" command so I cannot use `AND` condition)
I have no problems searching for the '>' character.
Please share your exact SPL and a sample event so we have a better view of the problem. What version of Splunk are you using?
I have no problems searching for the '>' character.
Please share your exact SPL and a sample event so we have a better view of the problem. What version of Splunk are you using?
Hi, I saw the RAW event and found that the text in the event is "Application -\u003e start of the log"
The greater than symbol is in unicode.
So I have to search as "Application -\\u003e start of the log".
Thank you.