Splunk Search

Missing fields in the index

iamsplunker31
Path Finder

Hi,

We have dynatrace data onboarded into Splunk though API. we came across this situation. When I ran the search with an index (index=abc)for last 4 hours/24 hours. There are only few fields are displaying in search results where if I ran the search for last 7 days all fields are displaying. I selected All fields in the results too. There is no field limitation in limits.conf
Can anyone please advise on this

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi iamsplunker31
at first a little question, did you executed your search using Verbose Mode or Smart Mode? try again using Verbose mode.

Then remember that field extractions are related to sourcetype not to index, so check if the sourcetypes when you run your search on 7 days are the same in 4/24 hours.

At least, remember that fields are showed only when they are present in results.
In addition, if you have few occurrences of a field in search results, it's possible that field isn't displayed: you can force display putting the field between Selected Fields, in this way it's showed even if it has few values.

Ciao.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi iamsplunker31
at first a little question, did you executed your search using Verbose Mode or Smart Mode? try again using Verbose mode.

Then remember that field extractions are related to sourcetype not to index, so check if the sourcetypes when you run your search on 7 days are the same in 4/24 hours.

At least, remember that fields are showed only when they are present in results.
In addition, if you have few occurrences of a field in search results, it's possible that field isn't displayed: you can force display putting the field between Selected Fields, in this way it's showed even if it has few values.

Ciao.
Giuseppe

0 Karma

iamsplunker31
Path Finder

Hi @gcusello , Thank you for your reply

Yes, I'm running my search in Verbose mode only
The sourcetype hasn't changed when I ran the search for last 7 days/ 24 hours ,I displayed all fields with in the event.
As you mentioned, The fields are may not be present in the results in selected time period(last 24hours)?
Thanks

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi iamsplunker31
you're welcome!
if this answer solves your problem, please accept and/or upvote it.
Ciao and next time!
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Enter the Dashboard Challenge and Watch the .conf24 Global Broadcast!

The Splunk Community Dashboard Challenge is still happening, and it's not too late to enter for the week of ...

Join Us at the Builder Bar at .conf24 – Empowering Innovation and Collaboration

What is the Builder Bar? The Builder Bar is more than just a place; it's a hub of creativity, collaboration, ...

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...