Splunk Search

Copy windows logs in raw mode

splunkcol
Builder

 

I currently find myself collecting logs using the windows universal forwarder, my client has requested a copy of the logs that have been collected from the windows sources for the last 2 months.

Is there any way to access this information or the only way is to run a query like index=main |fields _raw

 

 

Labels (1)
0 Karma
1 Solution

dtburrows3
Builder

You should be able to export _raw search results from a search head as a flat text file. You can see the export button next to the dropdown selector for search mode to run.

dtburrows3_0-1704395512049.png
From here you just select "Raw Events" and name the file, then click "Export"

dtburrows3_1-1704395632842.png

dtburrows3_2-1704395672311.png

 

 

View solution in original post

dtburrows3
Builder

You should be able to export _raw search results from a search head as a flat text file. You can see the export button next to the dropdown selector for search mode to run.

dtburrows3_0-1704395512049.png
From here you just select "Raw Events" and name the file, then click "Export"

dtburrows3_1-1704395632842.png

dtburrows3_2-1704395672311.png

 

 

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...