Splunk Search

Values with Pipe as String

andimak
New Member

Hi,

I have events which look like that:
a=test1 b=test2 func=test3|test4|test5
and
a=test1 b=test2 func=test5

if a make a search on func i get results like test3 or test5, but i want "test3|test4|test5" and test5 as result.
I tried to extract a new Field but its not working like i want it. It doesnt work with a delimiter space cause i will get the other key=value pairs too in this extracted field. And I dont really know how to make the regex extracted field to do this.

regards

Tags (1)
0 Karma

DalJeanis
Legend

In a search pipeline, you can do this to turn those three values into single values in a multivalue field...

| makemv delim="|" func

Here's a related answer - https://answers.splunk.com/answers/174880/how-to-extract-pipe-separated-subfields-from-a-fie.html

Hmmm. The pipes should not interfere with a normal extraction or a normal search.

Just be aware that with any command using regular expressions (regex, match, etc) you will need to escape the pipe character, or it will be interpreted as "OR".

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...