I had a log file that I generated fields for and it worked fine. The log file was not updated for two weeks. When it was updated today the fields have vanished. If I search and use all time I can see the fields but If I search just for today the fields have vanished. Any thoughts or suggestions?
A typical record looks like this
6/23/2010,8:22:51,Account_Name,5,5
The fields are
Date, Time, Account, Received, Authorized
You should post exact events from before and after. Please also post the extraction. Otherwise, it will be difficult to figure out why they have disappeared.
This can happen if something has changed within the event format or the source/sourcetype has changed. The extractions get applied based on the type of input and then a regex is applied to each event for field extraction. If your new data has a different format it is likely that the field extraction is not working correctly.
Hi Simeon,
My problem is as you explain. i have modified sourcetypes of ironport (thats because i want to separate access logs from config logs, cli logs, etc). before i had fields like c_ip, cs_username and so on. now these fields are disappeared.
How can i fix this ?
Thanks
Please add some additional details to your question (use the "edit" link). Specifically, how did you add the fields? Are you running as the same splunk user as you were previously? (Could be permissions related). Are you sure you simply don't have the fields selected to be shown. Are you searching from a different application than before?