Splunk Search

Search based on transformation field

benjiminhugh
Explorer

I came across a very strange problem:
I have a transformation field:
[record]
FORMAT = event_type::Record_DVR dvr_start_time::$1 dvr_end_time::$2 dvr_sid::$3 dvr_freq::$4
REGEX = RecordingManager.record(LocatorRecSpec<(\w{3} \w{3} \d{2} \d{2}:\d{2}:\d{2} EST\d+EDT \d{4}) to (\w{3} \w{3} \d{2} \d{2}:\d{2}:\d{2} EST\d+EDT \d{4}) OcapLocator[SId=([-|\d]) freq=([-|\d]) prog#=([-|\d]) ([\d|\w])]>)

And a search:
sourcetype=Message event_type=Record_DVR

This is doesn't work.
However If i change
event_type::Record

and
event_type=Record
It can work.
if I change both to Record_Dvr
still doesn't work
if change to record,
it works again!
I try a lot of ways, but the result is also very strange.

Tags (2)
0 Karma
1 Solution

Ayn
Legend

The behaviour you are seeing is very likely related to what is described in this blog post: http://blogs.splunk.com/2011/10/07/cannot-search-based-on-an-extracted-field/

The blog post really says it all so I won't say more than that 🙂

View solution in original post

Ayn
Legend

The behaviour you are seeing is very likely related to what is described in this blog post: http://blogs.splunk.com/2011/10/07/cannot-search-based-on-an-extracted-field/

The blog post really says it all so I won't say more than that 🙂

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...