What I suggest is to use a rex to extract the important part of the message into a variable (or field, as its called in Splunk). Explanation: In the above query “_raw” is an existing internal field in the “splunk” index and sourcetype name is “Basic”.. At first by the “table” command we have taken the “_raw” field . […] Appreciate any advise. You must be logged into splunk.com in order to post comments. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers. names, product names, or trademarks belong to their respective owners. Welcome Welcome to Splunk Answers, a Q&A forum for users to find answers to questions about deploying, managing, and using Splunk products. Didn't know about map. I've seen lots of similar questions but haven't been able to figure this out. Splunk Eval Splunk Stat Commands Splunk Stat Functions How to get data into Splunk Splunk SDK for Python. Engage with the Splunk community and learn how to get the most out of your Splunk deployment. You must be logged into splunk.com in order to post comments. My sample dashboard. I have a log file which looks like this: