Splunk auto extracts fields when fields=value criteria is met. Since the event has "msg=Network: " it auto extracts the msg field as Network
To overcome this I would use a regular expression with named capturing groups to extract specific fields as per the requirement
For e.g: to Capture the message using a named capturing group i would use this. Having said that using .* is not always the best method as it captures everything else after the msg actually ends. The field named as Message will capture the messages. LMK if this works
(?i)msg=(?P<Message>.*)
... View more