How to extract a field from Splunk?
Access the field extractor from the All Fields dialog box
To get the full set of source types in your Splunk deployment, go to the Field Extractions page in Settings. Run a search that returns events. At the top of the fields sidebar, click All Fields. In the All Fields dialog box, click Extract new fields.
How do you extract a field?
Extract a field in place
Press Ctrl+Alt+F or from the main menu, select Refactor | Extract Field. Select an expression you want to introduce as a field. If IntelliJ IDEA detects more than one occurrence in your code, it lets you specify which occurrences to replace.
What is Splunk _RAW?
_raw. The _raw field contains the original raw data of an event. The search command uses the data in _raw when performing searches and data extraction. You cannot always search directly on values of _raw , but you can filter on _raw with commands like regex or sort .