Splunk Enterprise Security

Raw data on Enterprise Security

stealth_eth0
New Member

Hello guys! Does anyone know  how I can get (raw data | raw log) from a dataset on Enterprise Security?

On Splunk Enterprise I usually use (| eval Log=_raw) and when I try to do the same on ES, I get empty response.

Thanks in advance for any help. 

Cheers!

Labels (1)
0 Karma

dhirendra761
Contributor

By desfault, Splunk extracted field automatically,

You can use regex to extract data from Raw data:

| eval Log=_raw <your_regex>

or if you are not aware of regex you can select any row and extract from splunk UI. refer below imageCapture.PNG

0 Karma

stealth_eth0
New Member

Yes, you're right.

But for some reason I'm not receiving anything.

I define logMessage like below:

stealth_eth0_0-1621456140479.png

Then I use | table command and don't get anything.

stealth_eth0_1-1621456160855.png

Again, I don't know if Enterprise is different from Enterprise Security at this point.

Thanks again.

0 Karma

dhirendra761
Contributor
| rex field=_raw

use this... after _raw you need to add some regex:

 

https://docs.splunk.com/Documentation/SplunkCloud/8.2.2104/SearchReference/Rex

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...