<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with splunk search behavior in version 7.0.4 in Installation</title>
    <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412483#M5554</link>
    <description>&lt;P&gt;Yes, it working. Using * at the end &lt;CODE&gt;index=testindex asset = "up%20asset*"&lt;/CODE&gt; also works. &lt;BR /&gt;
This also works    &lt;CODE&gt;..| where like(asset, "up%asset")&lt;/CODE&gt;&lt;BR /&gt;
But we cannot use &lt;CODE&gt;where&lt;/CODE&gt; condition because we want to filter out as many assets as possible before the first pipe.&lt;BR /&gt;
And we cannot use wildcards which may include other assets. We just want to be sure to filter only this one.&lt;BR /&gt;
The problem here is for the same data it works in 6.4.5&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jun 2018 09:27:44 GMT</pubDate>
    <dc:creator>immortalraghava</dc:creator>
    <dc:date>2018-06-29T09:27:44Z</dc:date>
    <item>
      <title>Issues with Splunk search behavior after upgrading from version 6.4.5 to 7.0.4.</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412477#M5548</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I upgraded my system from Splunk 6.4.5 to Splunk 7.&lt;BR /&gt;I found an issue with the search behavior.&lt;BR /&gt;Search:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt; index=testindex | where asset = "up%20asset"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;The above search produces results in 6.4.5 but not in 7.0.4&lt;BR /&gt;Has anything changed under the hood?&lt;BR /&gt;Any help is appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 20:30:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412477#M5548</guid>
      <dc:creator>immortalraghava</dc:creator>
      <dc:date>2020-06-15T20:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412478#M5549</link>
      <description>&lt;P&gt;So you are looking for a space in a URL in the events?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 19:50:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412478#M5549</guid>
      <dc:creator>cpetterborg</dc:creator>
      <dc:date>2018-06-28T19:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412479#M5550</link>
      <description>&lt;P&gt;Just to confirm your running this in smart mode?&lt;/P&gt;

&lt;P&gt;Also the asset field is extracted as you expected?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 01:19:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412479#M5550</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2018-06-29T01:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412480#M5551</link>
      <description>&lt;P&gt;Can you try : &lt;BR /&gt;
&lt;CODE&gt;index=testindex asset = "up*asset"&lt;/CODE&gt; &lt;BR /&gt;
or&lt;BR /&gt;
&lt;CODE&gt;..| where like(asset, "up%asset")&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;If no result, can you check if &lt;CODE&gt;asset&lt;/CODE&gt; is extracted in the fields bar, by running only &lt;CODE&gt;index=testindex&lt;/CODE&gt;, make sure you are running it in the smart mode.&lt;BR /&gt;
If it's there then check the values to make sure &lt;CODE&gt;up..&lt;/CODE&gt; is there&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 01:27:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412480#M5551</guid>
      <dc:creator>amiftah</dc:creator>
      <dc:date>2018-06-29T01:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412481#M5552</link>
      <description>&lt;P&gt;No, I am looking for the events with the exact asset value. That is how it is indexed. I can see on the left side event count for this asset when I run just &lt;CODE&gt;index=testindex&lt;/CODE&gt;. But when I try to filter it does not bring the results. For the same event data and same search, it works in 6.4.5&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 09:19:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412481#M5552</guid>
      <dc:creator>immortalraghava</dc:creator>
      <dc:date>2018-06-29T09:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412482#M5553</link>
      <description>&lt;P&gt;Yes, Asset field is extracted. Actually, I just select the asset from the left sidebar after running &lt;CODE&gt;index = testindex&lt;/CODE&gt;&lt;BR /&gt;
But for same data and same asset, we get results in 6.4.5&lt;BR /&gt;
Tried in all modes nothing happens. It does not work in the current 7.0.4 version.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 09:23:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412482#M5553</guid>
      <dc:creator>immortalraghava</dc:creator>
      <dc:date>2018-06-29T09:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412483#M5554</link>
      <description>&lt;P&gt;Yes, it working. Using * at the end &lt;CODE&gt;index=testindex asset = "up%20asset*"&lt;/CODE&gt; also works. &lt;BR /&gt;
This also works    &lt;CODE&gt;..| where like(asset, "up%asset")&lt;/CODE&gt;&lt;BR /&gt;
But we cannot use &lt;CODE&gt;where&lt;/CODE&gt; condition because we want to filter out as many assets as possible before the first pipe.&lt;BR /&gt;
And we cannot use wildcards which may include other assets. We just want to be sure to filter only this one.&lt;BR /&gt;
The problem here is for the same data it works in 6.4.5&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 09:27:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412483#M5554</guid>
      <dc:creator>immortalraghava</dc:creator>
      <dc:date>2018-06-29T09:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with splunk search behavior in version 7.0.4</title>
      <link>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412484#M5555</link>
      <description>&lt;P&gt;Can you try with version &lt;CODE&gt;7.0.3&lt;/CODE&gt;, I don't know I find this version the most stable..&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 11:26:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Issues-with-Splunk-search-behavior-after-upgrading-from-version/m-p/412484#M5555</guid>
      <dc:creator>amiftah</dc:creator>
      <dc:date>2018-06-29T11:26:53Z</dc:date>
    </item>
  </channel>
</rss>

