Splunk Search

How to display custom indexed fields within the sidebar in fast mode?

Hendrik2509
Engager

Hello,

I have configured a custom indexed field via transforms.conf and props.conf as following:

transforms.conf:  (/apps/search/local/)

[EventID]
FORMAT = EventID::$1
REGEX = <regex expression>
WRITE_META = true
 
props.conf: (/apps/search/local)
 
[<sourcetype>]
DATETIME_CONFIG = 
NO_BINARY_CHECK = true
category = custom
pulldown_type = 1
LINE_BREAKER = ([\r\n]+)
TRANSFORMS-EventID = EventID
 
fields.conf (etc/system/local)

[sourcetype::<sourcetype>::EventID]
INDEXED = True
 
The field EventID is getting indexed, I have checked it via
 
| walklex index="<index-name>" type=field
| search NOT field=" *"
| stats values(field)
 
The field will also show up at the sidebar when searching in smart mode, but not when searching in fast mode.
Is there any way to make it show up in fast mode too?
I assumed this woulde have been done by the fields.conf Stanza, but it seems not to work for me.
 
Labels (3)
0 Karma

VatsalJagani
SplunkTrust
SplunkTrust

@Hendrik2509 - Fast Mode only returns default fields and fields that you are searching as per definition.

So it does not necessarily search all the indexed fields.

https://docs.splunk.com/Documentation/Splunk/8.2.5/Search/Changethesearchmode#:~:text=Using%20the%20....

 

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...