I have a single Splunk light search head. I noticed EventCode and other windows log fields are missing from "Selected Fields."
So I enabled Splunk Add-on for Microsoft Windows. Still not shown.
All fields show are;
host, index, linecount, source, sourcetype, and splunk_server.
Do I need further configuration?
I suspect you are displaying results in 'Fast' mode, which doesn't do all the work to find/display the fields like that. You can change it by a drop-down under your "Time" dropdown. It probably says 'Fast' or 'Smart' (where mine in the below example already showed 'Verbose Mode'.)
You will want to pick "Verbose" then rerun your search.
You may be interested in a free e-learning course from Splunk: the Splunk Tutorial. I'm not positive it covers fast vs. verbose mode, but it has lots of useful "getting started" nuggets in it.
I suspect you are displaying results in 'Fast' mode, which doesn't do all the work to find/display the fields like that. You can change it by a drop-down under your "Time" dropdown. It probably says 'Fast' or 'Smart' (where mine in the below example already showed 'Verbose Mode'.)
You will want to pick "Verbose" then rerun your search.
You may be interested in a free e-learning course from Splunk: the Splunk Tutorial. I'm not positive it covers fast vs. verbose mode, but it has lots of useful "getting started" nuggets in it.
Thank you so much for your answer. I started the Tutorial you mentioned, which is very helpful! It did refer to the "verbose Mode," hinted for more fields.