Splunk Search

Missing fields in Splunk that were previously there

Stefanie
Builder

Hey all,

I have the Splunk add on for unix/linux deployed to about ~70 servers. All was working fine (and has been for years!) up until yesterday.

I'm receiving data into my os index (which is where those logs are stored) but after searching for anything beyond index, host, sourcetype, it does not work.

For example, for a search of 7 days ago I can search for something like:  index=os sourcetype=df host="server1" OR host="server2" | stats max(PercentUsedSpace) as PercentUsed by host,filesystem | sort - PercentUsed | where PercentUsed >=75

It will pull data from 7 days ago up until yesterday.

 

Searching data for yesterday to now gives me no data. 

If I search index=os host="server1" OR host="server2", I'm receiving logs as normal. The other sources and sourcetypes are there.

 

So i guess my question is, what happened to my "PercentUsedSpace"? It doesnt show in the interesting fields portion. I can't search for it. It returns blank.

 

My search for index=os source=df host="server1" OR host="server2" shows my logs. But I can't refine it down further. 

 

Edit: Now what is interesting in my logs, every now and then, I see that I am receiving a log that is something along the lines of " CPU pctUser pctNice pctSystem pctIowait pctIdle" , "Name rxPackets_PS txPackets_PS rxKB_PS txKB_PS", "memTotalMB memFreeMB memUsedMB memFreePct memUsedPct pgPageOut swapUsedPct pgSwapOut cSwitches interrupts forks processes threads loadAvg1mi waitThreads interrupts_PS pgPageIn_PS pgPageOut_PS"

 

So it seems that instead of parsing each field as type of field, it is parsing as a log. 

 

Please assist!

Labels (1)
0 Karma
1 Solution

Stefanie
Builder

This was resolved. Just updating my post in case someone else in the future has the same issue.

There was a props.conf that was implemented because of Splunk Professional Services' guidance.

Removing the props.conf resolved the issue.

 

View solution in original post

0 Karma

Stefanie
Builder

This was resolved. Just updating my post in case someone else in the future has the same issue.

There was a props.conf that was implemented because of Splunk Professional Services' guidance.

Removing the props.conf resolved the issue.

 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...