[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-03。"],[[["\u003cp\u003eRaw log searches in Google Security Operations allow users to examine raw logs and their correlation with UDM events and entities, aiding in understanding log normalization and identifying gaps.\u003c/p\u003e\n"],["\u003cp\u003eUsers can perform raw log searches by adding the prefix \u003ccode\u003eraw =\u003c/code\u003e to their search terms in the SIEM Search, or the UDM Search page, enclosed within quotation marks.\u003c/p\u003e\n"],["\u003cp\u003eTo optimize performance, users can limit the scope of raw log searches by adjusting the time range, selecting specific log sources, or using regular expressions.\u003c/p\u003e\n"],["\u003cp\u003eThe results of a raw log search display UDM events, entities, and the raw logs, which can be explored further to view related data or the complete log line and its source.\u003c/p\u003e\n"],["\u003cp\u003eThe number of events and entities extracted from each log line is limited to a maximum of 10.\u003c/p\u003e\n"]]],[],null,["Conduct a raw log search \nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n| **Note:** This feature is covered by [Pre-GA Offerings Terms](https://chronicle.security/legal/service-terms/) of the Google Security Operations Service Specific Terms. Pre-GA features might have limited support, and changes to pre-GA features might not be compatible with other pre-GA versions. For more information, see the [Google SecOps Technical Support Service guidelines](https://chronicle.security/legal/technical-support-services-guidelines/) and the [Google SecOps Service Specific Terms](https://chronicle.security/legal/service-terms/).\n\n\u003cbr /\u003e\n\n| **Note:** This feature is not available to all customers in all regions.\n\n\u003cbr /\u003e\n\nYou can use Google Security Operations to search the raw logs in your\nGoogle SecOps account and get relevant context with related events and\nentities.\n\nRaw log searches show you the correlation between raw events and the\nUDM events generated using those raw logs. A raw log search helps you to\nunderstand how log fields are parsed and normalized and helps you to investigate\nany gaps in the normalization process.\n\nAfter you complete a raw log search, each matching raw log line is replaced with\nthe events and entities contained in the log line. The number of events and\nentities extracted from each log line is limited to a maximum of 10.\n\nTo perform a raw log search, follow these steps:\n\n1. Go to **Investigation \\\u003e SIEM Search**.\n\n2. In the search field, add the prefix `raw = ` to your search and\n enclose your search term in quotation marks (for example, `raw =\n \"example.com\"`).\n\n3. Select the raw log search from the menu option. Google SecOps finds the\n associated raw logs, UDM events, and associated entities. You can also run\n the same search (raw = \"example.com\") from the UDM Search page.\n\nYou can use the same quick filters used to refine UDM search results. Select the\nfilter you want to apply to the raw log results to refine them further.\n\nOptimize raw log queries\n\nRaw log searches are typically slower than UDM searches. To improve your search\nperformance, limit the amount of data you conduct your query over by changing\nthe search settings:\n\n- Time range selector: Limits the time range of the data over which you run your query.\n- Log Source selector: Limits your raw log search to only the logs from specific sources, as opposed to all of your log sources. From the **Log\n sources** menu, select one or more log sources (the default is **all**).\n- Regular expressions: Use a regular expression. For example, `raw =\n /goo\\w{3}.com/` would match against `google.com`, `goodle.com`, `goog1e.com` to further limit the scope of your raw log search.\n\nTrend over time\n\nUse the trend graph to understand the distribution of raw logs over the time of\nyour search. You can apply filters on the graph to look for parsed logs and\nraw logs.\n\nRaw log results\n\nWhen you run a raw log search, the results are a combination of UDM events and\nentities generated by the raw logs that match your searches, along with the\nraw logs. You can explore the search results further by clicking any of the\nresults:\n\n- UDM event or entity: If you click a UDM event or entity, Google SecOps\n shows any related events and entities, along with the raw log associated\n with that item.\n\n- Raw log: If you click a raw log, Google SecOps shows\n you the entire raw log line, along with the source for that log.\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]