Splunk Search

Extraction does not take place in raw events

yuanliu
SplunkTrust
SplunkTrust

This happens in one of newly installed 10.0.1 instances.  The only data ingested is tutorialdata.zip from Splunk Tutorial.  The tutorial exercises on fields like action, productId, etc.  But this instance gives none of them.  After some long diagnosis, I found the culprit: The search command doesn't perform default key-value extraction in raw events.  Even if I force an extract command in search like this,

sourcetype=access_combined_wcookie
| extract kvdelim== pairdelim=&

those fields are still not extracted:

kv-on-raw 2025-11-24 at 9.24.07 PM.png

Only when I force the same pairdelim + kvdelim directly on url_query like this

sourcetype=access_combined_wcookie
| rename _raw as temp
| rename uri_query as _raw
| extract kvdelim== pairdelim=&

will this instance extract those fields:

kv-on-uri_query 2025-11-24 at 9.26.01 PM.png

How can I find the root cause?

Additional data points:

  • If I remove kvdelim== pairdelim=& from extract command, those fields can no longer be extracted even from url_query.
  • Automatic extraction with transform access-extraction (i.e.REPORT-access = access-extractionsworks just fine on sourcetype access_combined_wcookie. Otherwise fields like clientip and url_query will not be available.
  • I tested tutorialdata.zip in several other instances including a new 10.0 instance on Macbook.  No such problem exists.
Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How have you ingested the data?

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Using the exact sequence as detailed in Upload the tutorial data.  As mentioned, the same exercise was done in a few other instances including newly installed instances with no problem.  Today, I created another 10.0.1 instance on the same OS with nearly identical configurations, no such problem. 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

This is a strange one and given that it sems to work in every other environment, it sounds like there is nothing wrong with the process you used. Is it possible for you to compare you config files on a file by file basis between a working environment and non-working environment to determine what the significant difference might be?

0 Karma
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...