Splunk® Enterprise

Search Manual

Acrobat logo Download manual as PDF

Splunk Enterprise version 7.1 is no longer supported as of October 31, 2020. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.
Acrobat logo Download topic as PDF

Field expressions

When you add data, Splunk software extracts pairs of information and saves them as fields. Some fields are common to all events, but others are not. Adding fields to your search term gives you a better chance of matching specific events.

If you are searching web access logs for specific HTTP status errors, instead of searching for "web error 404", you can use fields to search for:


See Use fields to retrieve events.

Use comparison operators to match field values

You can use comparison operators to match a specific value or a range of field values.

Operator Example Result
= field=foo Multivalued field values that exactly match "foo".
!= field!=foo Multivalued field values that don't exactly match "foo".
< field<x Numerical field values that are less than x.
> field>x Numerical field values that are greater than x.
<= field<=x Numerical field values that are less than and equal to x.
>= field>=x Numerical field values that are greater than and equal to x.

For example, to find events that have a delay field that is greater than 10:

delay > 10

When quotes are required in field expressions

When the value you are searching for contains a breaking character, you must enclose the value in quotation marks.

Examples of breaking characters are spaces, commas, pipes, square brackets, and equals signs. In addition, to search for reserved keywords such as AND, OR, and NOT you must use quotation marks.

Field values that match SPL operators or keywords

There are several field values that match SPL operators or keywords, such as AS, AND, IN, and OR. Here are a few examples:

  • country=IN for India
  • country=AS or state=AS for American Samoa
  • iso=AND for Andorra
  • state=OR for Oregon

To search for field values that match operators or keywords, you must enclose the value in quotation marks. For example: country="IN".

Last modified on 26 May, 2019
Boolean expressions
Difference between NOT and !=

This documentation applies to the following versions of Splunk® Enterprise: 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.1.0

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters