When you add data, Splunk software extracts pairs of information and saves them as fields. Some fields are common to all events, but others are not. Adding fields to your search term gives you a better chance of matching specific events.
If you are searching web access logs for specific HTTP status errors, instead of searching for "web error 404", you can use fields to search for:
Use comparison operators to match field values
You can use comparison operators to match a specific value or a range of field values.
|=||field=foo||Multivalued field values that exactly match "foo".|
|!=||field!=foo||Multivalued field values that don't exactly match "foo".|
|<||field<x||Numerical field values that are less than x.|
|>||field>x||Numerical field values that are greater than x.|
|<=||field<=x||Numerical field values that are less than and equal to x.|
|>=||field>=x||Numerical field values that are greater than and equal to x.|
For example, to find events that have a delay field that is greater than 10:
delay > 10
Difference between NOT and !=
This documentation applies to the following versions of Splunk Cloud™: 6.5.0, 6.5.1, 6.5.1612, 6.6.0, 6.6.1, 6.6.3