I have an index in Splunk enterprise named "myindex". When I search for data using index="myindex" for the last 24 hours I get all results I want. I have some custom tags\fields for instance branch, version, product etc that I want to filter on.
When I click on the branch from the events viewer and click add to search no results are found, even though they were there in the previous results returned for the same time period. Similarly when I type into the search bar and select the autocomplete for the branch I want nothing is returned.
What is the reason this is happening?
Searching index="myindex" in the last 24hrs returns results including branch="mybranch-1-2" but searching for index="myindex" branch="mybranch-1-2" for the last 24hrs returns no results found.
Switch to verbose mode, and try this...
index="my_index" | search branch="mybranch*" | head 1
If there are results, try this....
index="my_index" branch="mybranch*" | head 1
If they are still there, then switch back to fast mode and see if they disappear.
Let us know what happened.
Those suggestions didn't work. I tried them both in fast mode, verbose mode and smart mode.
This doesn't work:
Both the above examples are returned in the original search index="my_index"
I needed to change to use colons as apparently it is meta data I'm adding to search. Splunks add to search functionality is misleading.