Splunk Cloud Platform

Search Manual

Acrobat logo Download manual as PDF

Acrobat logo Download topic as PDF

Search command primer

At the beginning of a search pipeline, the search command is implied, even though you do not explicitly specify it. If you type in


It is as if you typed in

search host=webserver*

Use keywords, phrases, fields, boolean expressions, and comparison expressions to specify exactly which events you want to retrieve from Splunk indexes.

For specific information see:

Keywords and phrases

By default, when you search with keywords and phrases, Splunk software retrieves events by matching against the raw event field, _raw, in your data. When you start adding search modifiers, such as fields like _time and tag, you are also matching against pieces of information that have been extracted from the _raw field.

When searching for strings, which includes keywords and quoted phrases (or anything that's not a search modifier), Splunk software searches the _raw field for the matching events or results. Some examples of keywords and phrases are:



web error

"web error"

Note that the search for the quoted phrase "web error" is not the same as the search before it. When you search for web error, Splunk software returns events that contain both "web" and "error". When you search for "web error", Splunk software only returns events that contain the phrase "web error".

File paths

To search for a file path, such as D:\Digital\RTFM, you can just specify the file path in your search. You don't need quotation marks around the phrase and you don't need to escape any characters. The reason for this? Because the phrase contains only minor breakers, like a colon ( : ) and a backslash ( \ ).

However, if the file path contains spaces you must enclose it in quotation marks. For example:

"D:\Digital\RTFM Backup Folder"

A space is considered a major breaker in data. To learn more about major and minor breakers, see Event segmentation and searching.

See Also

Last modified on 07 December, 2019
Search history

This documentation applies to the following versions of Splunk Cloud Platform: 8.0.2006, 8.0.2007, 8.1.2009, 8.1.2011, 8.1.2012, 8.1.2101, 8.1.2103, 8.2.2104, 8.2.2105, 8.2.2106, 8.2.2107 (latest FedRAMP release), 8.2.2109, 8.2.2111

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters