<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search inside file contents of uploaded events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530977#M149992</link>
    <description>&lt;P&gt;Thanks Soutamo,&lt;/P&gt;&lt;P&gt;I had been working with one area of our product where events were coming in in json format and were automatically parsed successfully. In this case I just needed to add additional field extraction which was delimited by _ and identified source code writing file structure which gave me everything I needed in addition with the docs suggested above 100% solved. Appreciate your time! Thx&lt;/P&gt;</description>
    <pubDate>Thu, 26 Nov 2020 09:52:58 GMT</pubDate>
    <dc:creator>Maycockk</dc:creator>
    <dc:date>2020-11-26T09:52:58Z</dc:date>
    <item>
      <title>How to search inside file contents of uploaded events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530262#M149821</link>
      <description>&lt;P&gt;Hoping someone can help, reasonably new to Splunk.&lt;/P&gt;
&lt;P&gt;I have a number of Splunk events that are uploaded small text files. Is there a way I can search inside these uploaded files explicitly? In my case they are transaction files that may be for sales or refunds.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for example I'd like to search though all transaction files for today to get metrics for all sales and refunds.&lt;/P&gt;
&lt;P&gt;The in advance.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Nov 2020 06:56:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530262#M149821</guid>
      <dc:creator>Maycockk</dc:creator>
      <dc:date>2020-11-21T06:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Search inside file contents of uploaded events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530276#M149826</link>
      <description>Maybe this helps you &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchTutorial/WelcometotheSearchTutorial" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchTutorial/WelcometotheSearchTutorial&lt;/A&gt;</description>
      <pubDate>Fri, 20 Nov 2020 22:34:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530276#M149826</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-11-20T22:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Search inside file contents of uploaded events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530977#M149992</link>
      <description>&lt;P&gt;Thanks Soutamo,&lt;/P&gt;&lt;P&gt;I had been working with one area of our product where events were coming in in json format and were automatically parsed successfully. In this case I just needed to add additional field extraction which was delimited by _ and identified source code writing file structure which gave me everything I needed in addition with the docs suggested above 100% solved. Appreciate your time! Thx&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 09:52:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-inside-file-contents-of-uploaded-events/m-p/530977#M149992</guid>
      <dc:creator>Maycockk</dc:creator>
      <dc:date>2020-11-26T09:52:58Z</dc:date>
    </item>
  </channel>
</rss>

