<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: missing extraction fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740878#M240491</link>
    <description>&lt;P&gt;As several people urged you, please post a complete sample of event, not screen cutouts. &amp;nbsp;You can sanitize the sample any way you like, but keep quotation marks, commas, curly brackets, square brackets in exact place.&lt;/P&gt;&lt;P&gt;Meanwhile, the cutouts give me enough info to determine that part of the event is JSON. &amp;nbsp;Here is an experiment for you.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "^[^{]+(?&amp;lt;only_json&amp;gt;.+})"
| spath input=only_json&lt;/LI-CODE&gt;&lt;P&gt;See if more fields gets out.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Mar 2025 04:24:08 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2025-03-05T04:24:08Z</dc:date>
    <item>
      <title>missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740474#M240439</link>
      <description>&lt;P&gt;I've created field extractions in splunkcloud.com, but they don't appear.&lt;/P&gt;&lt;P&gt;Here are my extractions:&lt;/P&gt;&lt;P&gt;settings&amp;gt;fields&amp;gt;field extractions:&amp;nbsp; App: searching &amp;amp; reporting, config source: visible in app, Owner: sc_admin&lt;/P&gt;&lt;TABLE width="657px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="103.6px"&gt;&lt;A href="https://prd-p-hpqhy.splunkcloud.com/en-US/manager/search/data/props/extractions/journal%20%3A%20EXTRACT-destip?action=edit&amp;amp;ns=search&amp;amp;f_ns=search&amp;amp;f_pwnr=sc_admin&amp;amp;f_search=&amp;amp;f_count=25&amp;amp;uri=%2FservicesNS%2Fnobody%2Fsearch%2Fdata%2Fprops%2Fextractions%2Fjournal%2520%253A%2520EXTRACT-destip" target="_blank" rel="noopener"&gt;journal : EXTRACT-destip&lt;/A&gt;&lt;/TD&gt;&lt;TD width="50px"&gt;Inline&lt;/TD&gt;&lt;TD width="183.9px"&gt;"dest_ip\":\"(?P&amp;lt;destip&amp;gt;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\”"&lt;/TD&gt;&lt;TD width="81.3px"&gt;&lt;DIV class=""&gt;sc_admin&lt;/DIV&gt;&lt;/TD&gt;&lt;TD width="60px"&gt;&lt;DIV class=""&gt;search&lt;/DIV&gt;&lt;/TD&gt;&lt;TD width="107.783px"&gt;Global &lt;SPAN class=""&gt;|&lt;/SPAN&gt; &lt;A href="https://prd-p-hpqhy.splunkcloud.com/en-US/manager/permissions/search/data/props/extractions/journal%20%3A%20EXTRACT-destip?manager_cancel_url=%2Fmanager%2Fsearch%2Fdata%2Fprops%2Fextractions%3Fns%3Dsearch%26app_only%3D0%26pwnr%3Dsc_admin%26search%3D%26count%3D25&amp;amp;uri=%2FservicesNS%2Fnobody%2Fsearch%2Fdata%2Fprops%2Fextractions%2Fjournal%2520%253A%2520EXTRACT-destip" target="_blank" rel="noopener"&gt;Permissions&lt;/A&gt;&lt;/TD&gt;&lt;TD width="69.4167px"&gt;&lt;P&gt;Enabled&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;object should appear: all apps&lt;/P&gt;&lt;P&gt;permissions: apps r/w, sc_admin r/w&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;A href="https://prd-p-hpqhy.splunkcloud.com/en-US/manager/search/data/props/extractions/journal%20%3A%20EXTRACT-srcip?action=edit&amp;amp;ns=search&amp;amp;f_ns=search&amp;amp;f_pwnr=sc_admin&amp;amp;f_search=&amp;amp;f_count=25&amp;amp;uri=%2FservicesNS%2Fnobody%2Fsearch%2Fdata%2Fprops%2Fextractions%2Fjournal%2520%253A%2520EXTRACT-srcip" target="_blank" rel="noopener"&gt;journal : EXTRACT-srcip&lt;/A&gt;&lt;/TD&gt;&lt;TD&gt;Inline&lt;/TD&gt;&lt;TD&gt;"src_ip\":\"(?P&amp;lt;srcip&amp;gt;[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)\”"&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;sc_admin&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;search&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;App &lt;SPAN class=""&gt;|&lt;/SPAN&gt; &lt;A href="https://prd-p-hpqhy.splunkcloud.com/en-US/manager/permissions/search/data/props/extractions/journal%20%3A%20EXTRACT-srcip?manager_cancel_url=%2Fmanager%2Fsearch%2Fdata%2Fprops%2Fextractions%3Fns%3Dsearch%26app_only%3D0%26pwnr%3Dsc_admin%26search%3D%26count%3D25&amp;amp;uri=%2FservicesNS%2Fnobody%2Fsearch%2Fdata%2Fprops%2Fextractions%2Fjournal%2520%253A%2520EXTRACT-srcip" target="_blank" rel="noopener"&gt;Permissions&lt;/A&gt;&lt;/TD&gt;&lt;TD&gt;Enabled&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;object should appear: this app only (search)&lt;/P&gt;&lt;P&gt;permissions: sc_admin r/w&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After Add data from a tar.gz file upload,&lt;/P&gt;&lt;P&gt;splunkcloud (login as sc_admin)&amp;gt;search&amp;gt;interesting fields: all fields:all fields doesn't include those fields.&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;P&gt;Btw, if I extract new fields with the same names it objects because they already exist.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 23:57:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740474#M240439</guid>
      <dc:creator>gersplunk</dc:creator>
      <dc:date>2025-03-01T23:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740476#M240441</link>
      <description>&lt;P&gt;Forget your extractions. &amp;nbsp;As the code snippet looks exactly like trying to use regex to extract from JSON. &amp;nbsp;Could you clarify whether the full raw event is in JSON? If it is, do not use regex. &amp;nbsp;If JSON is just part of event, the best option is to use extraction to extract the part that is JSON instead of directly extracting information fragment.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 00:53:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740476#M240441</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-03-02T00:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740487#M240443</link>
      <description>&lt;P&gt;Thanks for the reply, &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/33901"&gt;@yuanliu&lt;/a&gt;. Sadly I don't know whether it's actually json; it might be. It's a college assignment, and we just know it's a bunch of data/logs in tar.gz. "src_ip" and the other one have never appeared automatically in interesting fields so far. Would you expect them to appear as their "natural names" if it was json or would I need to do something proactive?&lt;/P&gt;&lt;P&gt;Either way, why doesn't the extracted field appear?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 06:33:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740487#M240443</guid>
      <dc:creator>gersplunk</dc:creator>
      <dc:date>2025-03-02T06:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740513#M240446</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/308145"&gt;@gersplunk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you search for the data, do you have&amp;nbsp;&lt;SPAN&gt;src_ip or dest_ip in the field list on the left?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You could also add | table *_ip to your search to see if src/dest IP is already an extracted field from the JSON.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you can post a screenshot and/or sample data then it might help us to work to you getting to the bottom of this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider adding karma to this or any other answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 15:28:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740513#M240446</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-03-02T15:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740518#M240448</link>
      <description>&lt;P&gt;You should have raw data from source. Then do needed extraction or use spath if it’s json. Best option is ingest data into your test/dev environment (like your workstation) and when it works copy those into your SCP environment You could/should create app(s) for those KOs to manage those.&amp;nbsp;&lt;BR /&gt;As you have SCP in use, you could order dev/test license from splunk to use in your test environment.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 17:11:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740518#M240448</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-03-02T17:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740699#M240484</link>
      <description>&lt;P&gt;Nice trick &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;, but no luck.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gersplunk_0-1741077796696.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/37957iEC49636D34115BF8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gersplunk_0-1741077796696.png" alt="gersplunk_0-1741077796696.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here's the field extraction for dest_ip&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gersplunk_1-1741078900284.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/37958iBAB57A263E35B0B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gersplunk_1-1741078900284.png" alt="gersplunk_1-1741078900284.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You can see the preview says '1000 events'... and there's a "dest_ip" at bottom left.&lt;/P&gt;&lt;P&gt;then &amp;gt;Save, &amp;gt;Finish&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gersplunk_2-1741079348843.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/37959i9F774C288324C5FA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gersplunk_2-1741079348843.png" alt="gersplunk_2-1741079348843.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Explore the fields I just created in Search:&lt;/P&gt;&lt;P&gt;it has changed time range to last 24h, showing no Results; then I change to All Time&lt;/P&gt;&lt;P&gt;and get the usual result: no sign of my extraction field on the left, in the 105 more fields or in All fields, etc.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gersplunk_3-1741079559330.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/37960i0D67D7B7D5362285/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gersplunk_3-1741079559330.png" alt="gersplunk_3-1741079559330.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 09:24:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740699#M240484</guid>
      <dc:creator>gersplunk</dc:creator>
      <dc:date>2025-03-04T09:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: missing extraction fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740878#M240491</link>
      <description>&lt;P&gt;As several people urged you, please post a complete sample of event, not screen cutouts. &amp;nbsp;You can sanitize the sample any way you like, but keep quotation marks, commas, curly brackets, square brackets in exact place.&lt;/P&gt;&lt;P&gt;Meanwhile, the cutouts give me enough info to determine that part of the event is JSON. &amp;nbsp;Here is an experiment for you.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "^[^{]+(?&amp;lt;only_json&amp;gt;.+})"
| spath input=only_json&lt;/LI-CODE&gt;&lt;P&gt;See if more fields gets out.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 04:24:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/missing-extraction-fields/m-p/740878#M240491</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-03-05T04:24:08Z</dc:date>
    </item>
  </channel>
</rss>

