Splunk Search

field values with "invisible" characters?

gliptak
Explorer

I have a number of events searchable by:

index=main sourcetype="myevents"

All of them show foo field with value bar

When adding that as a filter to my query:

index=main sourcetype="myevents" foo=bar

no results are returned.

If I update above to

index=main sourcetype="myevents" foo="bar*"

I do get results.

Any pointers on how to see the real value of foo?

PS I couldn't print foo as list of characters. The closest I got was

| rex field=foo mode=sed "s/(.)/\1+/g"

which printed

b+a+r+

note the last character seems to 'r'

Labels (1)
Get Updates on the Splunk Community!

Blueprints for High-Maturity Operations: Splunk Lantern Articles on SOAR, ES 8.4, ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...

Simplifying the Analyst Experience with Finding-based Detections

    Splunk invites you to an engaging Tech Talk focused on streamlining security operations with ...

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...