<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do search fo fields after extraction? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-search-fo-fields-after-extraction/m-p/322779#M6753</link>
    <description>&lt;P&gt;You need to use it with where or search command -&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | where temperature &amp;gt; 50
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | eval threshold=50 | where temperature &amp;gt; threshold
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | search temperature &amp;gt; 50
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 31 May 2017 04:36:07 GMT</pubDate>
    <dc:creator>dineshraj9</dc:creator>
    <dc:date>2017-05-31T04:36:07Z</dc:date>
    <item>
      <title>How do search fo fields after extraction?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-search-fo-fields-after-extraction/m-p/322778#M6752</link>
      <description>&lt;P&gt;I have created a search for the following on a data feed. The log will show in format below:&lt;BR /&gt;
"2641328 [EPS-log-dispatcher-11] INFO  1.24978294676695149906 - {"Log Header": "{"endpointKeyHash":{"string":"MAz7MadOhr02tPt5vtZsSEy9FWw="},"applicationToken":{"string":"24978294676695149906"},"headerVersion":{"int":1},"timestamp":{"long":1495594584490},"logSchemaVersion":{"int":2}}", "Event": {"temperature":-1,"timeStamp":1495594583638}}"&lt;/P&gt;

&lt;P&gt;I have a search to extract the fields I wanted as below and now I wanted to create an alert to trigger when temperature is above 50. &lt;BR /&gt;
temperature sourcetype=kaa | rex field=_raw "\"endpointKeyHash\":{\"string\":\"(?[^\"]&lt;EM&gt;)\".&lt;/EM&gt;\"Event\": (?{.*})}$"| spath input=mydata | table _time, endpoint, temperature | eval threshold=50 &lt;/P&gt;

&lt;P&gt;Using the above example, I can't just add | temperature &amp;gt; 50. It says &lt;BR /&gt;
"Search Factory: Unknown search command 'temperature'. " &lt;/P&gt;

&lt;P&gt;How should I phrase my search?&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 04:24:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-search-fo-fields-after-extraction/m-p/322778#M6752</guid>
      <dc:creator>wuming79</dc:creator>
      <dc:date>2017-05-31T04:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: How do search fo fields after extraction?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-do-search-fo-fields-after-extraction/m-p/322779#M6753</link>
      <description>&lt;P&gt;You need to use it with where or search command -&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | where temperature &amp;gt; 50
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | eval threshold=50 | where temperature &amp;gt; threshold
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | search temperature &amp;gt; 50
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 31 May 2017 04:36:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-do-search-fo-fields-after-extraction/m-p/322779#M6753</guid>
      <dc:creator>dineshraj9</dc:creator>
      <dc:date>2017-05-31T04:36:07Z</dc:date>
    </item>
  </channel>
</rss>

