<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default fields are not visible in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70097#M180610</link>
    <description>&lt;P&gt;Hi, &lt;BR /&gt;
When I search with particular sourcetype, I get all the data and fields which are extracted are shown on the left side of the flashtimeline. But I'm not getting default fields like date_month, date_hour in interesting field section. Am I missing anything here?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 14:08:32 GMT</pubDate>
    <dc:creator>ChhayaV</dc:creator>
    <dc:date>2020-09-28T14:08:32Z</dc:date>
    <item>
      <title>Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70097#M180610</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;
When I search with particular sourcetype, I get all the data and fields which are extracted are shown on the left side of the flashtimeline. But I'm not getting default fields like date_month, date_hour in interesting field section. Am I missing anything here?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:08:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70097#M180610</guid>
      <dc:creator>ChhayaV</dc:creator>
      <dc:date>2020-09-28T14:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70098#M180611</link>
      <description>&lt;P&gt;Are the fields also unavailable under the "View all X fields" link?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2013 14:01:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70098#M180611</guid>
      <dc:creator>jtworzydlo</dc:creator>
      <dc:date>2013-06-20T14:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70099#M180612</link>
      <description>&lt;P&gt;yeah there not available even in "View all x fields" link.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 06:15:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70099#M180612</guid>
      <dc:creator>ChhayaV</dc:creator>
      <dc:date>2013-06-21T06:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70100#M180613</link>
      <description>&lt;P&gt;Which specific fields are you missing? Just the &lt;CODE&gt;date_*&lt;/CODE&gt; fields? Because these are not available for all sources, for instance they are not present for Windows event logs, among others.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 08:51:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70100#M180613</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-06-21T08:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70101#M180614</link>
      <description>&lt;P&gt;date_* fields and some timeendpos, timestartpos fields. I've loaded sharepoint logs. For the same logs in previous indexer they were visible. But in new indexer i've loaded same logs but they're not visible.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 09:09:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70101#M180614</guid>
      <dc:creator>ChhayaV</dc:creator>
      <dc:date>2013-06-21T09:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70102#M180615</link>
      <description>&lt;P&gt;Seems like fields related to the time processor. In event logs at least these are not included because the time processor is not invoked in the same way as regular file  monitor based inputs. You could always recreate the &lt;CODE&gt;date_*&lt;/CODE&gt; fields using &lt;CODE&gt;eval&lt;/CODE&gt;'s &lt;CODE&gt;strftime&lt;/CODE&gt; function.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 09:29:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70102#M180615</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-06-21T09:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70103#M180616</link>
      <description>&lt;P&gt;"Seems like fields related to the time processor. In event logs at least these are not included because the time processor is not invoked in the same way as regular file monitor based inputs."&lt;/P&gt;

&lt;P&gt;I didn't understand this.If possible can u explain me in simple language?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 11:48:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70103#M180616</guid>
      <dc:creator>ChhayaV</dc:creator>
      <dc:date>2013-06-21T11:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70104#M180617</link>
      <description>&lt;P&gt;Hello Chhaya,&lt;BR /&gt;
i faced the same problem when i extracted the time from the log instead of using the Splunk's event timings. However as "AYN" suggested, you can use strftime to get those fields. It's pretty easy.&lt;/P&gt;

&lt;P&gt;Try this:&lt;BR /&gt;
Your search|eval date_mday=strftime(_time,"%d")|eval date_month=strftime(_time,"%b")|table date_mday,date_month &lt;/P&gt;

&lt;P&gt;By this way you will be able to use them at search time for charting/stats related queries.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:08:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70104#M180617</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2020-09-28T14:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70105#M180618</link>
      <description>&lt;P&gt;Hi linu1988,&lt;/P&gt;

&lt;P&gt;If i run search like this &lt;/P&gt;

&lt;P&gt;sourcetype="INSPRODSP" |eval date_mday=strftime(_time,"%d")|eval date_month=strftime(_time,"%b")|table date_mday,date_month&lt;/P&gt;

&lt;P&gt;INSPRODSP has my all data, if run above query will this affect the existing timestamp of indexed events?&lt;/P&gt;

&lt;P&gt;Or it'll just give me the default fields ?&lt;/P&gt;

&lt;P&gt;I'm asking this because, I just want to make sure that above query will not affect the existing indexed data!!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:09:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70105#M180618</guid>
      <dc:creator>ChhayaV</dc:creator>
      <dc:date>2020-09-28T14:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70106#M180619</link>
      <description>&lt;P&gt;You can never change data in the index, so you don't have to worry.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2013 06:28:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70106#M180619</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-06-25T06:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: Default fields are not visible</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70107#M180620</link>
      <description>&lt;P&gt;BUt if you eval on search head it is extremely slow process verse having the indexer only return valid data.  I am now trying this with a 7.0.0 universal forwarder and the same issue STILL exists... When is splunk going to fix this obvious mistake?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2017 17:57:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Default-fields-are-not-visible/m-p/70107#M180620</guid>
      <dc:creator>jfunderburg</dc:creator>
      <dc:date>2017-10-16T17:57:40Z</dc:date>
    </item>
  </channel>
</rss>

