Splunk Search

_meta fields: why am I unable to search for all of the events?

godman
Path Finder

I am not able to search for all of the events from the fields. When i try field::value , I can see all of the events. But with field=value , only some of the events are searchable.
updated my fields.conf with [field] INDEXED = true , but do i also need to update my inputs.conf with the fields and its values? There are going to be more values for the fields, and it can be hard to update all of them?

Tags (3)

vasanthmss
Motivator

You are using indexed time extration. You have to supply required fileds props and transforms to the search peers. If you are using heavy forwarder confs should to be in hf.

https://docs.splunk.com/Documentation/Splunk/7.2.4/Data/Configureindex-timefieldextraction

V
0 Karma

mstjohn_splunk
Splunk Employee
Splunk Employee

Hi @godman,

Not sure if this helps, but I stumbled upon this answers post that seems similar to yours. Thought I'd pass it along just in case. https://answers.splunk.com/answers/389567/why-is-a-search-for-fields-added-with-meta-in-inpu.html

0 Karma

godman
Path Finder

In this example they only have one value for the field and in my case i have many values for each field and i am not able to add all of them to the inputs.conf .

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...