<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to save correlation search in ITSI getting error  &amp;quot;Invalid search string: This search cannot be parsed when parse_only is set to true.&amp;quot; in Splunk ITSI</title>
    <link>https://community.splunk.com/t5/Splunk-ITSI/Unable-to-save-correlation-search-in-ITSI-getting-error-quot/m-p/458716#M1605</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;Using ITSI on Splunk Cloud.&lt;/P&gt;

&lt;P&gt;Using  the following search  to create a correlation search&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;search pattern&lt;BR /&gt;
| eval MatchPattern = &lt;BR /&gt;
    [| inputlookup test.csv &lt;BR /&gt;
    | eval PatternToSearch="\"%".Error."%\"" &lt;BR /&gt;
    | eval commandToExecute="message LIKE ".PatternToSearch.",\"".Message."\"" &lt;BR /&gt;
    | fields commandToExecute &lt;BR /&gt;
    | stats delim="," values(commandToExecute) as commandToExecute &lt;BR /&gt;
    | mvcombine commandToExecute &lt;BR /&gt;
    | eval commandToExecute="case(".commandToExecute.",1=1,\"UnMatched\")" &lt;BR /&gt;
    | return $commandToExecute] &lt;BR /&gt;
| fillnull MatchPattern value="Null" &lt;BR /&gt;
| search MatchPattern!= "UnMatched"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The search runs fine but when I try to save the correlation search, I get the error &lt;CODE&gt;"Invalid search string: This search cannot be parsed when parse_only is set to true."&lt;/CODE&gt; which I found is a Javascript limitation. Any workaround for this?&lt;/P&gt;</description>
    <pubDate>Tue, 14 May 2019 10:29:50 GMT</pubDate>
    <dc:creator>bangalorep</dc:creator>
    <dc:date>2019-05-14T10:29:50Z</dc:date>
    <item>
      <title>Unable to save correlation search in ITSI getting error  "Invalid search string: This search cannot be parsed when parse_only is set to true."</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Unable-to-save-correlation-search-in-ITSI-getting-error-quot/m-p/458716#M1605</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;Using ITSI on Splunk Cloud.&lt;/P&gt;

&lt;P&gt;Using  the following search  to create a correlation search&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;search pattern&lt;BR /&gt;
| eval MatchPattern = &lt;BR /&gt;
    [| inputlookup test.csv &lt;BR /&gt;
    | eval PatternToSearch="\"%".Error."%\"" &lt;BR /&gt;
    | eval commandToExecute="message LIKE ".PatternToSearch.",\"".Message."\"" &lt;BR /&gt;
    | fields commandToExecute &lt;BR /&gt;
    | stats delim="," values(commandToExecute) as commandToExecute &lt;BR /&gt;
    | mvcombine commandToExecute &lt;BR /&gt;
    | eval commandToExecute="case(".commandToExecute.",1=1,\"UnMatched\")" &lt;BR /&gt;
    | return $commandToExecute] &lt;BR /&gt;
| fillnull MatchPattern value="Null" &lt;BR /&gt;
| search MatchPattern!= "UnMatched"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The search runs fine but when I try to save the correlation search, I get the error &lt;CODE&gt;"Invalid search string: This search cannot be parsed when parse_only is set to true."&lt;/CODE&gt; which I found is a Javascript limitation. Any workaround for this?&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 10:29:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Unable-to-save-correlation-search-in-ITSI-getting-error-quot/m-p/458716#M1605</guid>
      <dc:creator>bangalorep</dc:creator>
      <dc:date>2019-05-14T10:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to save correlation search in ITSI getting error  "Invalid search string: This search cannot be parsed w</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Unable-to-save-correlation-search-in-ITSI-getting-error-quot/m-p/511047#M2106</link>
      <description>&lt;P&gt;&lt;SPAN&gt;You can't use a sub-search returning into an eval in a correlation search. As a workaround:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Create and save a basic correlation search with all of the information you want outside of the search. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. As an admin user, go to &lt;STRONG&gt;Settings &amp;gt; Searches, reports, and alerts&lt;/STRONG&gt; and open the correlation search you just created. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. Add the sub-search you were trying to add there.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This workaround is also documented in known issue&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/ITSI/latest/ReleaseNotes/Knownissues#Uncategorized_issues" target="_self"&gt;&lt;SPAN&gt;ITSI-3322&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt;in the release notes.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 05:41:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Unable-to-save-correlation-search-in-ITSI-getting-error-quot/m-p/511047#M2106</guid>
      <dc:creator>esnyder_splunk</dc:creator>
      <dc:date>2020-07-27T05:41:52Z</dc:date>
    </item>
  </channel>
</rss>

