Splunk IT Service Intelligence

Unable to save correlation search in ITSI getting error "Invalid search string: This search cannot be parsed when parse_only is set to true."

bangalorep
Communicator

Hello,

Using ITSI on Splunk Cloud.

Using the following search to create a correlation search

search pattern
| eval MatchPattern =
[| inputlookup test.csv
| eval PatternToSearch="\"%".Error."%\""
| eval commandToExecute="message LIKE ".PatternToSearch.",\"".Message."\""
| fields commandToExecute
| stats delim="," values(commandToExecute) as commandToExecute
| mvcombine commandToExecute
| eval commandToExecute="case(".commandToExecute.",1=1,\"UnMatched\")"
| return $commandToExecute]
| fillnull MatchPattern value="Null"
| search MatchPattern!= "UnMatched"

The search runs fine but when I try to save the correlation search, I get the error "Invalid search string: This search cannot be parsed when parse_only is set to true." which I found is a Javascript limitation. Any workaround for this?

0 Karma

esnyder_splunk
Splunk Employee
Splunk Employee

You can't use a sub-search returning into an eval in a correlation search. As a workaround:

1. Create and save a basic correlation search with all of the information you want outside of the search.

2. As an admin user, go to Settings > Searches, reports, and alerts and open the correlation search you just created.

3. Add the sub-search you were trying to add there.

This workaround is also documented in known issue ITSI-3322 in the release notes. 

0 Karma
Get Updates on the Splunk Community!

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

New Learning Videos on Topics Most Requested by You! Plus This Month’s New Splunk ...

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

How I Instrumented a Rust Application Without Knowing Rust

As a technical writer, I often have to edit or create code snippets for Splunk's distributions of ...