Splunk Search

How to export raw events instead of statistics?

Woodpecker
Path Finder

Hi,

I have a query which gives a table of results. Now instead of exporting the table, I need to export the raw events itself. How can I do that?

Instead of exporting 9980 values, I need to export the whole 16882 events

Any help would be appreciated!

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

When you click the Export icon, choose "Raw events" from the Format dropdown.

---
If this reply helps you, Karma would be appreciated.
0 Karma

Woodpecker
Path Finder

I want to enable a email alert action and export the results as raw events

0 Karma

richgalloway
SplunkTrust
SplunkTrust

That's an option in the alert action.

richgalloway_0-1679316603353.png

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...