Every event in an index has field XYZ (with a non-null positive number, no exceptions), and yet this search: index=<index> XYZ=* only finds 99.8% of the events. The way to find the 'missing' 0.2% of the events is by this search: index=<index> NOT XYZ=* Looking at the missing event's _raw, the data is there, and extracting values from _raw (spath) works -- just not via field names in Splunk Search. This 'error' only impacts around 0.2% of the events. Has anyone seen anything like this before? The event is in Splunk, just not searchable. What do I ask the administrators here to investigate?
... View more