Splunk Series: Field searches
Fields are searchable key/value pairs in your event data Fields can be searched by their name, for example: area_code=404 action=purchase status=200 When you look for multiple items in the editor an implied AND will be implied unless specified otherwise (AND, OR, NOT) to the search as follows action=purchase AND status=200 Field Discovery Splunk automatically discovers […]
Splunk Series: Field searches Read More »