Splunk Search

Few fields not visible when check on the all feilds section but i can see them when i table them with the names.

HarishSamudrala
Loves-to-Learn

I have a strange issue, when i search for specific event in Splunk and I am looking for specific fields( ex field1, field2) i can not see them in selected fields and interested fields.

But, when i run the same query and table those fields , i can see them. 

index=1234 sourcetype=4567 --> can not see those fields when this search is triggered. But when i add a table command with those field names in the search i can see the fields and the values for them.

 

index=1234 sourcetype=4567 | table field1, field2 --> this query i can see the fields.

 

Did any one face this issue ? We are on latest Splunk version 9.0.X..

 

 

Labels (1)
0 Karma

HarishSamudrala
Loves-to-Learn

Hi @richgalloway ,

Thanks for you inputs on this. 

We are running the search in verbose mode only, but this did no help us. The event we are dealing with is very big and we are thinking if Splunk is hitting any limitation in showing up all the fields in the left side panel selected fields and interested fields.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

How big are the events?  Splunk default to 200 field extractions, IIRC.  Also, what type of data is it?  I've seen problems extracting JSON data, especially nested JSON.

---
If this reply helps you, Karma would be appreciated.
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

This could be the reason. Just hunting this kind of issues and still working with it.

You should look limits.conf and it's kv-stanza. Also check what you have on your sourcetype (and/or host and source) definition's TRUNCATE value. Both of those are affecting how many fields splunk automatically found.

r. Ismo

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @HarishSamudrala ,

in addition to the hint of @richgalloway , remember that in interesting fields you see only the fields present in at least 20% of the events, probably these fields have a minor percentage.

Instead running a search with these fields (e.g. field1=*), they are present at the 100% of the events.

If you open the "All fields" panel, you can see fields present (by default) in more than 1% of the events and you can use also a filter to have all the fields without a threshold

Ciao.

Giuseppe

0 Karma

HarishSamudrala
Loves-to-Learn

hi @gcusello ,

Thanks for your inputs on this. 

Yeah , we have validated that "All fields" are selected in the fields drop down.  We are running the search in verbose mode.

But, nothing helped...out event is very big and i am thinking if there is any limitation Splunk is hitting in showing up the fields. 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Make sure you're running the search in Verbose mode.  In Smart mode, Splunk only extracts fields explicitly referenced in the query.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...