<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use a field value to search _raw? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632254#M15506</link>
    <description>&lt;P&gt;Without knowing your data we can't really offer any reasonable advice but I suspect that it could just be resolved by proper data onboarding. (unless your events are really _completely_ unstructured).&lt;/P&gt;</description>
    <pubDate>Fri, 24 Feb 2023 21:46:14 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-02-24T21:46:14Z</dc:date>
    <item>
      <title>How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632093#M15492</link>
      <description>&lt;P&gt;I have a subsearch, and am trying to use the value of a field I extracted in an inner search, to check if that value exists anywhere in _raw for the results of my outer search.&lt;/P&gt;&lt;P&gt;Current search:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;index=my_index&amp;nbsp;&lt;BR /&gt;| append&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [ searchindex=my_index&amp;nbsp; "RecievedFileID"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | rex field=_raw&amp;nbsp; "RecievedFileID\s(?&amp;lt;file_id&amp;gt;\w*)"&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | fields file_id ]&amp;nbsp;&lt;BR /&gt;| search file_id&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can confirm the regex is working, but cant figure out how to check _raw for any presence of the value of file_id. The logic I'm looking for on the last line is essentially&lt;/P&gt;&lt;P&gt;| where _raw contains the value of file_id&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Any assistance is appreciated.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 20:45:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632093#M15492</guid>
      <dc:creator>brentrmc</dc:creator>
      <dc:date>2023-02-23T20:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632096#M15493</link>
      <description>&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Search/Changetheformatofsubsearchresults" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Search/Changetheformatofsubsearchresults&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Having said that - are you aware what is the difference between&lt;/P&gt;&lt;PRE&gt;search ABC&lt;/PRE&gt;&lt;P&gt;and&lt;/P&gt;&lt;PRE&gt;search _raw=*ABC*&lt;/PRE&gt;</description>
      <pubDate>Thu, 23 Feb 2023 21:19:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632096#M15493</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-02-23T21:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632201#M15502</link>
      <description>&lt;P&gt;Thanks, I'm working on trying format command. I can confirm that I get file_id back, but cannot figure out how to search the raw events for the values of that field.&lt;/P&gt;&lt;P&gt;I can run &lt;STRONG&gt;| search ABC &lt;/STRONG&gt;or&lt;STRONG&gt; | search _raw=*ABC*&amp;nbsp;&lt;/STRONG&gt;and get the correct results in my case, because of how it is logged.&amp;nbsp;&amp;nbsp;But what if ABC is a field&amp;nbsp;&lt;EM&gt;value&lt;/EM&gt;, say in a field called letters? How can I search &lt;STRONG&gt;_raw = values(letters)&lt;/STRONG&gt; or&amp;nbsp; &lt;STRONG&gt;_raw = 'letters'&lt;/STRONG&gt;?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 13:36:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632201#M15502</guid>
      <dc:creator>brentrmc</dc:creator>
      <dc:date>2023-02-24T13:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632229#M15503</link>
      <description>&lt;P&gt;I asked if you know the difference. The results might be the same but performance is vastly different.&lt;/P&gt;&lt;P&gt;With field contents you simply search for "field=value" as long as this value is extracted.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 16:49:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632229#M15503</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-02-24T16:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632252#M15505</link>
      <description>&lt;P&gt;Yes, I know the difference.&lt;/P&gt;&lt;P&gt;The problem lies in that the field can only be extracted from the first event in the source, because the first event always has the same predictable format&lt;/P&gt;&lt;P&gt;Subsequent events in the same source have the same field &lt;EM&gt;value&lt;/EM&gt; present, but each in a unpredictable location and unpredictable number of events.&lt;/P&gt;&lt;P&gt;So I cannot use a single field extraction to grab it everywhere, and hence why I have to extract it from the first event, and then search _raw if the value of that first extracted field exists anywhere in the rest of the events.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 20:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632252#M15505</guid>
      <dc:creator>brentrmc</dc:creator>
      <dc:date>2023-02-24T20:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to use a field value to search _raw?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632254#M15506</link>
      <description>&lt;P&gt;Without knowing your data we can't really offer any reasonable advice but I suspect that it could just be resolved by proper data onboarding. (unless your events are really _completely_ unstructured).&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 21:46:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-a-field-value-to-search-raw/m-p/632254#M15506</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-02-24T21:46:14Z</dc:date>
    </item>
  </channel>
</rss>

