Splunk Search

Splunk is not searching results

sasankganta
Path Finder

Index=A sourcetype=B and I can see under fields category filed "C" with count of 10k+ values ..

But if I search with  Index=A sourcetype=B category=C , It is showing No results found tried in all the search modes didn't worked. source tcp:9997 . Can some one please suggest what can be the issue. 

Labels (1)
Tags (1)
0 Karma

sasankganta
Path Finder

field:: * worked , Thank You so much 

 

0 Karma

scelikok
SplunkTrust
SplunkTrust

@sasankganta,

Great! So, if you set this field as INDEXED on your search head, you will not need to use :: syntax. You can use below sample, than you will be able to search field=*

fields.conf

[field]
INDEXED=true

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

Is it possible that your category field is being sent to Splunk as a _meta? Please try searching like below;

I assume your field is C;

index=A sourcetype=B C::*

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Yes, after using the same search like with "*field*" , still events are missing.

Under filed value count it's showing 4lack+ events , but in search filed value is showing 8 events. 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

If I got it right, on your first search you see category values under C field? If so, you should use below search to filter categories;

index=A sourcetype=B C=*

If I missed something, please give a sample logs, result in screen capture.

 

If this reply helps you an upvote is appreciated.

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Hi @scelikok ,

I'm searching for list of indexes using

|tstats count where index=* sourcetype=log4j  by index sourcetype

I got results with lot of indexes in my environment. How can I find out which Data model / Macro using these indexes ?

Is there any way to find out where it's been using ? Thanks in advance.  

0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...