First of all, I don't think the formatting is correct. Your field of granny.smith should certainly be wrapped by quotes to be read properly (try double quotes). I would recommend using any sort of coding library to help do this for you. But, even if the event data was printed in a proper format, you'd need to extract your fields somehow.
I would recommend either of two solutions, presuming your event data is completely in JSON format:
Create a custom sourcetype props stanza and specify for KV mode to JSON:
[sourcetype]
KV_MODE = json
Preferred format as this search extraction will extract for fields from the JSON data consistently reducing need to append to every search query manually
Reference: https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Exampleconfigurationsusingfieldtransforms
Use spath command within your search
*SPL* | spath
This command will pull from the _raw field by default, but you can specify any other field
Reference: http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath
Either way, once you have those fields, how you can reference these fields thereafter, you'll need to use single quotes for any sort of calculated field manipulation. In your case, if if the fields were indeed extracted and you wanted to search against it, here's an SPL query sample:
index=main 'granny.apple.color' != "green"
Give that a shot.
... View more