Splunk Search

Splunk is not searching results

sasankganta
Path Finder

Index=A sourcetype=B and I can see under fields category filed "C" with count of 10k+ values ..

But if I search with  Index=A sourcetype=B category=C , It is showing No results found tried in all the search modes didn't worked. source tcp:9997 . Can some one please suggest what can be the issue. 

Labels (1)
Tags (1)
0 Karma

sasankganta
Path Finder

field:: * worked , Thank You so much 

 

0 Karma

scelikok
SplunkTrust
SplunkTrust

@sasankganta,

Great! So, if you set this field as INDEXED on your search head, you will not need to use :: syntax. You can use below sample, than you will be able to search field=*

fields.conf

[field]
INDEXED=true

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

Is it possible that your category field is being sent to Splunk as a _meta? Please try searching like below;

I assume your field is C;

index=A sourcetype=B C::*

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Yes, after using the same search like with "*field*" , still events are missing.

Under filed value count it's showing 4lack+ events , but in search filed value is showing 8 events. 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @sasankganta,

If I got it right, on your first search you see category values under C field? If so, you should use below search to filter categories;

index=A sourcetype=B C=*

If I missed something, please give a sample logs, result in screen capture.

 

If this reply helps you an upvote is appreciated.

If this reply helps you an upvote and "Accept as Solution" is appreciated.

sasankganta
Path Finder

Hi @scelikok ,

I'm searching for list of indexes using

|tstats count where index=* sourcetype=log4j  by index sourcetype

I got results with lot of indexes in my environment. How can I find out which Data model / Macro using these indexes ?

Is there any way to find out where it's been using ? Thanks in advance.  

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...