Splunk Search

Extraction does not take place in raw events

yuanliu
SplunkTrust
SplunkTrust

This happens in one of newly installed 10.0.1 instances.  The only data ingested is tutorialdata.zip from Splunk Tutorial.  The tutorial exercises on fields like action, productId, etc.  But this instance gives none of them.  After some long diagnosis, I found the culprit: The search command doesn't perform default key-value extraction in raw events.  Even if I force an extract command in search like this,

sourcetype=access_combined_wcookie
| extract kvdelim== pairdelim=&

those fields are still not extracted:

kv-on-raw 2025-11-24 at 9.24.07 PM.png

Only when I force the same pairdelim + kvdelim directly on url_query like this

sourcetype=access_combined_wcookie
| rename _raw as temp
| rename uri_query as _raw
| extract kvdelim== pairdelim=&

will this instance extract those fields:

kv-on-uri_query 2025-11-24 at 9.26.01 PM.png

How can I find the root cause?

Additional data points:

  • If I remove kvdelim== pairdelim=& from extract command, those fields can no longer be extracted even from url_query.
  • Automatic extraction with transform access-extraction (i.e.REPORT-access = access-extractionsworks just fine on sourcetype access_combined_wcookie. Otherwise fields like clientip and url_query will not be available.
  • I tested tutorialdata.zip in several other instances including a new 10.0 instance on Macbook.  No such problem exists.
Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How have you ingested the data?

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Using the exact sequence as detailed in Upload the tutorial data.  As mentioned, the same exercise was done in a few other instances including newly installed instances with no problem.  Today, I created another 10.0.1 instance on the same OS with nearly identical configurations, no such problem. 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

This is a strange one and given that it sems to work in every other environment, it sounds like there is nothing wrong with the process you used. Is it possible for you to compare you config files on a file by file basis between a working environment and non-working environment to determine what the significant difference might be?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...