Splunk Search

Indexed field is not showing up when I use "=" in the search.

paras
Explorer

We use cribl for field extraction. `Action` is a field that is being parsed from cribl and it should be a indexed field in splunk.


Did a initial search with the query "index=client* sourcetype=unix_auth" 
Screen Shot 2021-08-12 at 9.17.24 AM.png

This returns 6 failure in the last 4 hours. 

When I use the search "index=client* sourcetype=unix_auth action=fail*". It returns all 6 failed events. 

Screen Shot 2021-08-12 at 9.17.48 AM.png

when I then change the search to "index=client* sourcetype=unix_auth action=failure" It does not return any events. 

Screen Shot 2021-08-12 at 9.18.06 AM.png

But when I use the " :: " in the search "index=client* sourcetype=unix_auth action::failure" It returns all the events. 

Screen Shot 2021-08-12 at 9.18.17 AM.png

Sample event:

 

Screen Shot 2021-08-12 at 9.24.37 AM.png

Labels (2)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @paras,

You should add your extracted indexed fields into fields.conf on your search heads. Otherwise you can only search using :: notation. Please try below;

fields.conf

[action]
INDEXED=true
If this reply helps you an upvote and "Accept as Solution" is appreciated.
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...