<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Some fields with &amp;gt;90% coverage disappear randomly between searches in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484481#M135617</link>
    <description>&lt;P&gt;Same thing. I've tried looking into search.log files of a search that succeeds in extracting "info.event_type" at search time and a search that does not - there is no mentioning of anything like "event_type" in either file, particularly I was expecting to see it in this line:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;05-05-2020 12:10:09.484 INFO  LocalCollector - Final required fields list = *,Message,_bkt,_cd,_raw,_si,_subsecond,action,bytes_in,bytes_out,category,clamav_action,crit,dest_host,duration,eventtype,host,http_user_agent,id,index,linecount,main_sig_ver,message,message_extended,msg,null,ossec_group,ossec_group_list,process,product_version,request_content_type,rule_number,severity,signature,signature_version,source,sourcetype,splunk_server,src_ip,status,type,uid,vendor_product,vendor_severity
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The only place the field name is mentioned is in the results in buckets/ and /events dirs.&lt;BR /&gt;
I've also thought that the following line is relevant to my problem, but it's just a coincidence between Splunk eventtypes and "info.event_type" field, I guess:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;05-05-2020 12:10:09.574 WARN  FastTyper - Eventtypes may be incomplete. Event length=152930 is more than maxlen=10000. Please consider increasing the maxlen value under [typer] stanza in limits.conf
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 30 Sep 2020 05:12:51 GMT</pubDate>
    <dc:creator>funghorn</dc:creator>
    <dc:date>2020-09-30T05:12:51Z</dc:date>
    <item>
      <title>Some fields with &gt;90% coverage disappear randomly between searches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484479#M135615</link>
      <description>&lt;P&gt;So this is a prerequisite-free kind of question about a field disappearing from "All Fields" section. By prerequisite-free I mean that search time frame, number of events found, search string and search mode are stable/same and all events have a single sourcetype.&lt;/P&gt;

&lt;P&gt;Say I have a field called "info.event_type" that has coverage of 100% (all of the conditions from the first paragraph stay the same throughout all steps). This is what is happening:&lt;BR /&gt;
1. I do a search and see the field in "All Fields" and "Interesting Fields". I can select it or it can already be selected by me previously, this does not matter (it seems).&lt;BR /&gt;
2. I repeat the exact same search by clicking the search button and the field disappears from everywhere - selected, interesting and all fields, it's not searchable in the filter box of all fields window.&lt;BR /&gt;
3. I repeat the search again, maybe a couple of times in a row, field does not appear.&lt;BR /&gt;
4. On one of the retries it appears and is present everywhere, as before.&lt;BR /&gt;
5. Next search request makes it disappear again and the circle continues...&lt;/P&gt;

&lt;P&gt;What could be the reason for this behavior? Do you know where I can look in order to check for inconsistencies in configuration, etc?&lt;BR /&gt;
Thanks! &lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 12:14:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484479#M135615</guid>
      <dc:creator>funghorn</dc:creator>
      <dc:date>2020-04-29T12:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Some fields with &gt;90% coverage disappear randomly between searches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484480#M135616</link>
      <description>&lt;P&gt;Hello @funghorn ,&lt;/P&gt;

&lt;P&gt;can you repeat your search using other time frame, like "last 24 hours" and use "verbose mode"? Any hints in the search.log?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 09:23:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484480#M135616</guid>
      <dc:creator>PavelP</dc:creator>
      <dc:date>2020-04-30T09:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Some fields with &gt;90% coverage disappear randomly between searches</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484481#M135617</link>
      <description>&lt;P&gt;Same thing. I've tried looking into search.log files of a search that succeeds in extracting "info.event_type" at search time and a search that does not - there is no mentioning of anything like "event_type" in either file, particularly I was expecting to see it in this line:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;05-05-2020 12:10:09.484 INFO  LocalCollector - Final required fields list = *,Message,_bkt,_cd,_raw,_si,_subsecond,action,bytes_in,bytes_out,category,clamav_action,crit,dest_host,duration,eventtype,host,http_user_agent,id,index,linecount,main_sig_ver,message,message_extended,msg,null,ossec_group,ossec_group_list,process,product_version,request_content_type,rule_number,severity,signature,signature_version,source,sourcetype,splunk_server,src_ip,status,type,uid,vendor_product,vendor_severity
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The only place the field name is mentioned is in the results in buckets/ and /events dirs.&lt;BR /&gt;
I've also thought that the following line is relevant to my problem, but it's just a coincidence between Splunk eventtypes and "info.event_type" field, I guess:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;05-05-2020 12:10:09.574 WARN  FastTyper - Eventtypes may be incomplete. Event length=152930 is more than maxlen=10000. Please consider increasing the maxlen value under [typer] stanza in limits.conf
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:12:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Some-fields-with-gt-90-coverage-disappear-randomly-between/m-p/484481#M135617</guid>
      <dc:creator>funghorn</dc:creator>
      <dc:date>2020-09-30T05:12:51Z</dc:date>
    </item>
  </channel>
</rss>

