host).server1).Default Fields:
_time: The timestamp of the event.host: The system or device that generated the event.source: The file, stream, or source of the data.sourcetype: The format or type of the data (e.g., json, csv).Custom Fields:
username from a log entry like user=alice creates a custom field called username with the value alice.host, source, _time.Splunk provides commands to manipulate and customize fields during searches. Below are key commands explained in detail:
Use the fields command to include or exclude fields in your search results.
Including fields:
index=main | fields host, source, error_message
host, source, and error_message fields in the search results.Excluding fields:
index=main | fields -error_message
error_message field from the search results.Why Use fields?
Use the rename command to assign an alias to a field.
Syntax:
index=main | rename host as server_name
host field to server_name.Why Rename Fields?
Use the eval command to create or modify fields dynamically.
Syntax:
index=main | eval error_level=if(severity>=3, "high", "low")
error_level based on the value of the severity field.severity is 3 or greater, error_level is set to "high"; otherwise, it's set to "low."Why Use eval?
To derive new insights or metrics from existing data.
Example:
Calculating response time differences:
index=main | eval response_diff=response_end - response_start
Splunk sometimes doesn’t automatically extract all fields, especially in unstructured data. In such cases, you can manually extract fields using the following methods:
rex CommandThe rex command uses regular expressions (regex) to extract fields from raw event data.
Syntax:
index=main | rex field=_raw "user=(?<username>\w+)"
rex: Specifies the command.field=_raw: Targets the raw data of the event."user=(?<username>\w+)": The regex pattern to match and extract the username.(?<username>\w+): Captures the username value into a field called username.Example Log:
time=2025-01-01 user=alice action=login
Result:
username is created with the value alice.Why Use rex?
Why Use the Field Extractor?
In Splunk, every event automatically includes four default fields, regardless of the data source or indexing method:
| Field | Description |
|---|---|
_time |
The timestamp of the event |
host |
The name of the system that generated the event |
source |
The origin of the data (e.g., log file path) |
sourcetype |
The format or structure of the data |
These fields are always present and do not require any manual extraction.
Why this matters for SPLK-1001:
Splunk’s Interesting Fields panel (on the left of the search UI) allows users to explore data interactively.
Clicking on a field (e.g., status) shows a list of its most frequent values.
Clicking a value (e.g., 200) automatically adds a field=value filter to your search query.
This enables quick drill-down without writing SPL manually.
Example:
Clicking status=404 in the field panel updates the search to:
... status=404
Why this matters for SPLK-1001:
Expect questions on how clicking field values affects search results.
Scenario-based questions may describe user interactions with this panel.
eval-Created FieldsThe eval command lets you create computed or derived fields, but it's important to understand:
Fields created by eval exist only during the search job.
They are not stored in the index.
They are not available to future searches unless redefined.
Example:
index=main | eval is_error=if(status=500, "yes", "no")
Here, is_error is a temporary field. It vanishes once the search ends.
Exam Tip: If asked “What happens to a field created by eval after the search completes?” the answer is: It no longer exists.
When you extract fields using the Field Extractor UI, and choose to save the pattern, the result becomes a:
Field Extraction Knowledge Object
It can be reused across multiple searches.
Its visibility (global or app-level) depends on how you configure permissions.
It’s stored under the app’s knowledge objects (can be managed under Settings > Fields > Field Extractions).
Why this is tested:
This introduces the idea that Splunk is not just a search engine — it's a knowledge platform.
Splunk automatically categorizes certain fields as “Interesting” when:
They appear in a large percentage of the events returned by a search.
The threshold varies, but common fields like status, source, and method often appear.
These fields are:
Shown in the left-hand Interesting Fields panel.
Ordered by prevalence and alphabetical order.
Useful for quickly identifying patterns in the data.
Here’s a command cheat sheet that’s useful for review and the exam:
| Command | Function | Example |
|---|---|---|
fields |
Include or exclude specific fields | fields host, source |
rename |
Rename a field for display purposes | rename host as server_name |
eval |
Create or manipulate field values | eval is_error=if(status=500, "yes", "no") |
rex |
Extract fields using regex patterns | rex field=_raw "user=(?<username>\w+)" |
| Exam Concept | You Should Know |
|---|---|
| Default fields | _time, host, source, sourcetype |
| Interactive field filtering | Clicking a value filters the search for that field/value |
eval fields are temporary |
They do not persist beyond the search |
| Saved field extractions | Become reusable knowledge objects |
| Interesting Fields behavior | Based on frequency across returned events |
| SPL field commands | fields, rename, eval, rex — know basic syntax |
What are fields in Splunk search results?
Fields are key-value pairs extracted from event data that allow users to search, filter, and analyze information.
Splunk processes machine data and extracts fields such as host, source, sourcetype, or application-specific attributes. These fields allow users to run more precise searches like status=404 or user=admin. Without fields, users would need to manually parse raw text events. Fields therefore enable structured analysis on otherwise unstructured data. The certification exam often tests whether candidates understand that fields represent searchable metadata extracted from events.
Demand Score: 80
Exam Relevance Score: 92
What is the difference between default fields and interesting fields in the Splunk Fields sidebar?
Default fields are always extracted by Splunk (such as host, source, sourcetype), while interesting fields are dynamically identified fields that frequently appear in the current search results.
Default fields exist in almost every Splunk event and are indexed automatically. In contrast, interesting fields are detected dynamically based on frequency and usefulness in the result set. The fields sidebar highlights these fields to help users quickly refine searches without manually examining event data. This behavior is commonly tested in certification exams because it demonstrates how Splunk helps analysts explore data efficiently.
Demand Score: 78
Exam Relevance Score: 88
How can you filter search results using a specific field in Splunk?
Add the field and value directly to the search query, such as status=404.
Splunk allows users to refine searches using field-value pairs. For example:
index=web status=404
This search returns only events where the status field equals 404. Field filtering dramatically reduces irrelevant results and improves search performance. The SPLK-1001 exam frequently includes scenarios where candidates must identify the correct syntax for filtering by field values.
Demand Score: 84
Exam Relevance Score: 94
What does the fields command do in a Splunk search?
The fields command specifies which fields should be included or excluded in the search results.
The fields command is used to control the structure of output results. For example:
... | fields host status uri
This keeps only the specified fields in the results table. Conversely, using fields - fieldname removes a field. This command is commonly used when preparing data for reports, dashboards, or further transformations. The certification exam often checks whether candidates know how to control visible fields in search output.
Demand Score: 75
Exam Relevance Score: 90
What happens when you click a field value in the Splunk fields sidebar?
Splunk automatically adds that field and value to the search query to filter results.
The fields sidebar is designed to help analysts refine searches quickly. Clicking a field value creates a filter such as field=value, which updates the search results to include only matching events. This interactive functionality allows users to drill down into data without manually editing queries. Understanding this workflow is important for new Splunk users and appears in the SPLK-1001 exam objectives.
Demand Score: 72
Exam Relevance Score: 87