Splunk Search

Field that exist is not showing in search report

trevor7
Engager

Hello all,

I have a query which creates a table similar to the following:

 

| table S42DSN_0001 S42DSN_0010

 

The table populates data within the S42DSN_0001 column, but not the S42DSN_0010 column.   I've double checked that there is definitely data captured within that field by looking at the events.

There are 20 similarly named fields using the format S42DSN_00## which are found within the raw event data. Only the first 8 return results using the above query.

For example the following works fine:

 

| table S42DSN_0001 S42DSN_0002

 

Any thoughts on why this might be happening? I am wondering if events past iteration S42DSN_0008 are not considered interesting, so Splunk is leaving them out of the results? Oddly enough, if I change my time period to the past 30 days, and use S42DSN_0010=* as a search criteria, I receive some, but not all results within that column.

Thanks in advance,

Trevor

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @trevor7 ,

in interesting fields there are only fields present at least in the 20% of the displayed events, to see the others go in "Other fields".

you can force Splunk to display them, adding to your search (only for test) the condition S42DSN_0010=*, select this field as Selected and then remove the above additional condition.

In this way you should see this field in your list.

About the not displayed using the table command is another issue that I cannot check without accessing your data, do you see them in interesting fields?

The only check I hint is on the field name, that's case sensitive.

Then selecting the above field, you should see the value of this field for each event so you can be sure that there's a value for this field; maybe you have few rows with this field and you are seeing only the ones without it.

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @trevor7 ,

in interesting fields there are only fields present at least in the 20% of the displayed events, to see the others go in "Other fields".

you can force Splunk to display them, adding to your search (only for test) the condition S42DSN_0010=*, select this field as Selected and then remove the above additional condition.

In this way you should see this field in your list.

About the not displayed using the table command is another issue that I cannot check without accessing your data, do you see them in interesting fields?

The only check I hint is on the field name, that's case sensitive.

Then selecting the above field, you should see the value of this field for each event so you can be sure that there's a value for this field; maybe you have few rows with this field and you are seeing only the ones without it.

Ciao.

Giuseppe

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @trevor7 ,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma

PickleRick
SplunkTrust
SplunkTrust

We have no idea what your events look like and what is your configuration so we can't know how and why the fields are (not) extracted.

Most probably your sourcetype is misconfigured and doesn't extract the fields or the extractions aren't configured at all and Splunk relies on its automatic extractions which your events might not completely fit into.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...