Splunk Search

Is there a list of unusable field names?

krisreeves
Path Finder

Note: The question is not "how do I search for a field with the name of tag", but "what other field name(s) behave like this"?

We recently ran into this case:

  • A user logged a message that included the text tag="some stuff"
  • User tried to search by that field, but gets an error like unable to find tag "some stuff"

tag appears to be a reserved word, but I was unable to find a list of any other cases like this. It's unfortunate that the tags functionality (which isn't in use) uses the same syntax as field matching here.

We'd like to add some code to warn on this kind of case, is there a list of all such keywords which, when searching keyword=foo, would not actually match the field name keyword?

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

You can search by escaping the double quotation.

index=XXX "tag=\"some stuff\""

The following are used in the basic search part.
※If there is a shortage, please someone supplement.

Internal fields
_raw, _time, _indextime, _cd

Basic default fields
host, index, linecount, punct, source, sourcetype, splunk_server, timestamp

Default datetime fields
date_hour, date_mday, date_minute, date_month, date_second, date_wday, date_year, date_zone

etc
tag,eventtype,earliest,latest

View solution in original post

0 Karma

krisreeves
Path Finder

So far, beyond the default fields listed here: https://docs.splunk.com/Documentation/Splunk/7.1.0/Data/Aboutdefaultfields

There is tag and eventtype

0 Karma

niketn
Legend

@krisreeves for the data that you have ingested seems like there is tag (and possibly eventtype) created.
You would need to create a Field Extraction to name the field something other than tag like Tag with uppercase T.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

HiroshiSatoh
Champion

You can search by escaping the double quotation.

index=XXX "tag=\"some stuff\""

The following are used in the basic search part.
※If there is a shortage, please someone supplement.

Internal fields
_raw, _time, _indextime, _cd

Basic default fields
host, index, linecount, punct, source, sourcetype, splunk_server, timestamp

Default datetime fields
date_hour, date_mday, date_minute, date_month, date_second, date_wday, date_year, date_zone

etc
tag,eventtype,earliest,latest

0 Karma

krisreeves
Path Finder

This is good to know! My question is, however, different: I'm looking to know which, if any, other field names behave like this so that we can avoid using them entirely

0 Karma

HiroshiSatoh
Champion

The following are used in the basic search part.
※If there is a shortage, please someone supplement.

Internal fields
_raw, _time, _indextime, _cd

Basic default fields
host, index, linecount, punct, source, sourcetype, splunk_server, timestamp

Default datetime fields
date_hour, date_mday, date_minute, date_month, date_second, date_wday, date_year, date_zone

etc
tag,eventtype,earliest,latest

0 Karma

krisreeves
Path Finder

Ah, of course -- I should have thought about earliest and latest 🙂 If you could edit this into your answer I'd like to accept this as the answer?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...