<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Missing fields in Splunk that were previously there in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Missing-fields-in-Splunk-that-were-previously-there/m-p/576072#M200753</link>
    <description>&lt;P&gt;Hey all,&lt;/P&gt;&lt;P&gt;I have the Splunk add on for unix/linux deployed to about ~70 servers. All was working fine (and has been for years!) up until yesterday.&lt;/P&gt;&lt;P&gt;I'm receiving data into my os index (which is where those logs are stored) but after searching for anything beyond index, host, sourcetype, it does not work.&lt;/P&gt;&lt;P&gt;For example, for a search of 7 days ago I can search for something like:&amp;nbsp;&amp;nbsp;index=os sourcetype=df host="server1" OR host="server2" | stats max(PercentUsedSpace) as PercentUsed by host,filesystem | sort - PercentUsed | where PercentUsed &amp;gt;=75&lt;/P&gt;&lt;P&gt;It will pull data from 7 days ago up until yesterday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Searching data for yesterday to now gives me no data.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If I search index=os host="server1" OR host="server2", I'm receiving logs as normal. The other sources and sourcetypes are there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i guess my question is, what happened to my "PercentUsedSpace"? It doesnt show in the interesting fields portion. I can't search for it. It returns blank.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My search for&amp;nbsp;index=os source=df host="server1" OR host="server2" shows my logs. But I can't refine it down further.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: Now what is interesting in my logs, every now and then, I see that I am receiving a log that is something along the lines of "&amp;nbsp;&lt;SPAN class=""&gt;CPU&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctUser&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctNice&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctSystem&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctIowait&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctIdle" , "Name rxPackets_PS txPackets_PS rxKB_PS txKB_PS", "memTotalMB memFreeMB memUsedMB memFreePct memUsedPct pgPageOut swapUsedPct pgSwapOut cSwitches interrupts forks processes threads loadAvg1mi waitThreads interrupts_PS pgPageIn_PS pgPageOut_PS"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;So it seems that instead of parsing each field as type of field, it is parsing as a log.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please assist!&lt;/P&gt;</description>
    <pubDate>Tue, 23 Nov 2021 18:55:03 GMT</pubDate>
    <dc:creator>Stefanie</dc:creator>
    <dc:date>2021-11-23T18:55:03Z</dc:date>
    <item>
      <title>Missing fields in Splunk that were previously there</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-fields-in-Splunk-that-were-previously-there/m-p/576072#M200753</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;&lt;P&gt;I have the Splunk add on for unix/linux deployed to about ~70 servers. All was working fine (and has been for years!) up until yesterday.&lt;/P&gt;&lt;P&gt;I'm receiving data into my os index (which is where those logs are stored) but after searching for anything beyond index, host, sourcetype, it does not work.&lt;/P&gt;&lt;P&gt;For example, for a search of 7 days ago I can search for something like:&amp;nbsp;&amp;nbsp;index=os sourcetype=df host="server1" OR host="server2" | stats max(PercentUsedSpace) as PercentUsed by host,filesystem | sort - PercentUsed | where PercentUsed &amp;gt;=75&lt;/P&gt;&lt;P&gt;It will pull data from 7 days ago up until yesterday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Searching data for yesterday to now gives me no data.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If I search index=os host="server1" OR host="server2", I'm receiving logs as normal. The other sources and sourcetypes are there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i guess my question is, what happened to my "PercentUsedSpace"? It doesnt show in the interesting fields portion. I can't search for it. It returns blank.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My search for&amp;nbsp;index=os source=df host="server1" OR host="server2" shows my logs. But I can't refine it down further.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: Now what is interesting in my logs, every now and then, I see that I am receiving a log that is something along the lines of "&amp;nbsp;&lt;SPAN class=""&gt;CPU&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctUser&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctNice&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctSystem&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctIowait&lt;/SPAN&gt; &lt;SPAN class=""&gt;pctIdle" , "Name rxPackets_PS txPackets_PS rxKB_PS txKB_PS", "memTotalMB memFreeMB memUsedMB memFreePct memUsedPct pgPageOut swapUsedPct pgSwapOut cSwitches interrupts forks processes threads loadAvg1mi waitThreads interrupts_PS pgPageIn_PS pgPageOut_PS"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;So it seems that instead of parsing each field as type of field, it is parsing as a log.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please assist!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 18:55:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-fields-in-Splunk-that-were-previously-there/m-p/576072#M200753</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-11-23T18:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: Missing fields in Splunk that were previously there</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-fields-in-Splunk-that-were-previously-there/m-p/576090#M200763</link>
      <description>&lt;P&gt;This was resolved. Just updating my post in case someone else in the future has the same issue.&lt;/P&gt;&lt;P&gt;There was a props.conf that was implemented because of Splunk Professional Services' guidance.&lt;/P&gt;&lt;P&gt;Removing the props.conf resolved the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 21:17:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-fields-in-Splunk-that-were-previously-there/m-p/576090#M200763</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-11-23T21:17:07Z</dc:date>
    </item>
  </channel>
</rss>

