Splunk Search

Indexed field is not showing up when I use "=" in the search.

paras
Explorer

We use cribl for field extraction. `Action` is a field that is being parsed from cribl and it should be a indexed field in splunk.


Did a initial search with the query "index=client* sourcetype=unix_auth" 
Screen Shot 2021-08-12 at 9.17.24 AM.png

This returns 6 failure in the last 4 hours. 

When I use the search "index=client* sourcetype=unix_auth action=fail*". It returns all 6 failed events. 

Screen Shot 2021-08-12 at 9.17.48 AM.png

when I then change the search to "index=client* sourcetype=unix_auth action=failure" It does not return any events. 

Screen Shot 2021-08-12 at 9.18.06 AM.png

But when I use the " :: " in the search "index=client* sourcetype=unix_auth action::failure" It returns all the events. 

Screen Shot 2021-08-12 at 9.18.17 AM.png

Sample event:

 

Screen Shot 2021-08-12 at 9.24.37 AM.png

Labels (2)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @paras,

You should add your extracted indexed fields into fields.conf on your search heads. Otherwise you can only search using :: notation. Please try below;

fields.conf

[action]
INDEXED=true
If this reply helps you an upvote and "Accept as Solution" is appreciated.
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...