Thanks just a start as cipher is not able to filter filed just cipher Example On Cipher it adds extra field as it sees in splunk search @timestamp: 2022-05-08T15:10:28.291Z @version: 1 Broker: broker a_time: 2022-05-08 15:10:28.275 app_id: appid host: server message: SSL accepted cipher=ECDHE-RSA-AES256-GCM-SHA384 path: /apps/broker/port/logs/server.log port: port type: type } Show as raw text host = server host = server message = SSL accepted cipher=ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384","host":"xxxx","path":"/apps/broker/port/logs/server.domain.log","broker":"broker-NE1","type":"type","@version":"1","a_time":"2022-05-08 similarly user and server also comes as comes with other texts like user /DC=net/DC=company/DC=vvvv/CN=zzz]","host":"server","path":"/apps/broker/port/logs/server.log","Broker":"broker-NE1","type":"type"," server also clobbered. Thanks, Kannan
... View more