Splunk Search

Splunk is not searching results

sasankganta
Path Finder

Index=A sourcetype=B and I can see under fields category filed "C" with count of 10k+ values ..

But if I search with  Index=A sourcetype=B category=C , It is showing No results found tried in all the search modes didn't worked. source tcp:9997 . Can some one please suggest what can be the issue. 

Labels (1)
Tags (1)
0 Karma

sasankganta
Path Finder

field:: * worked , Thank You so much 

 

0 Karma

scelikok
SplunkTrust
SplunkTrust

@sasankganta,

Great! So, if you set this field as INDEXED on your search head, you will not need to use :: syntax. You can use below sample, than you will be able to search field=*

fields.conf

[field]
INDEXED=true

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

Is it possible that your category field is being sent to Splunk as a _meta? Please try searching like below;

I assume your field is C;

index=A sourcetype=B C::*

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Yes, after using the same search like with "*field*" , still events are missing.

Under filed value count it's showing 4lack+ events , but in search filed value is showing 8 events. 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

If I got it right, on your first search you see category values under C field? If so, you should use below search to filter categories;

index=A sourcetype=B C=*

If I missed something, please give a sample logs, result in screen capture.

 

If this reply helps you an upvote is appreciated.

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Hi @scelikok ,

I'm searching for list of indexes using

|tstats count where index=* sourcetype=log4j  by index sourcetype

I got results with lot of indexes in my environment. How can I find out which Data model / Macro using these indexes ?

Is there any way to find out where it's been using ? Thanks in advance.  

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...