<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Missing field values in report in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487659#M136241</link>
    <description>&lt;P&gt;It looks like the missing field is causing the event to be skipped over in the data model.  Check the constraints on the data model to make sure they are correct.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Sep 2019 21:04:31 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2019-09-18T21:04:31Z</dc:date>
    <item>
      <title>Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487658#M136240</link>
      <description>&lt;P&gt;We have logs in the following format[1]. We created a report with few fields like time, service, operation, method, principle, systemid and count.&lt;/P&gt;

&lt;P&gt;But when ever a field is missing in the log, the report is not picking up the log to display it in the report.&lt;/P&gt;

&lt;P&gt;[1]&lt;/P&gt;

&lt;P&gt;2019-09-18T19:41:20.624+0000 INFO    855 com.l7tech.log.custom.splunk : -4: |&lt;A href="https://apiqa.flatball.com/fmpsp2p/service%7CgetReleaseInfo%7CSOAP%7C10.88.30.32%7Cp2p_client_esmartct%7C%7C87d19df99245%7Ctext/xml"&gt;https://apiqa.flatball.com/fmpsp2p/service|getReleaseInfo|SOAP|10.88.30.32|p2p_client_esmartct||87d19df99245|text/xml&lt;/A&gt;; charset=UTF-8&lt;/P&gt;

&lt;P&gt;In the above example, the system id is missing and the report didnt pickup this log.&lt;/P&gt;

&lt;P&gt;Search used for the report is as below:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| pivot servicestrafficcaapimodel servicesapiqads count(servicesapiqads) AS count SPLITROW _time AS _time PERIOD day SPLITROW service AS service SPLITROW operation AS operation SPLITROW method AS method SPLITROW principal AS principal SPLITROW systemid AS systemid TOP 100 count(servicesapiqads) ROWSUMMARY 0 COLSUMMARY 0 SHOWOTHER 1 | SORT -_time
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 18 Sep 2019 20:24:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487658#M136240</guid>
      <dc:creator>pdantuuri0411</dc:creator>
      <dc:date>2019-09-18T20:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487659#M136241</link>
      <description>&lt;P&gt;It looks like the missing field is causing the event to be skipped over in the data model.  Check the constraints on the data model to make sure they are correct.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 21:04:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487659#M136241</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-09-18T21:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487660#M136242</link>
      <description>&lt;P&gt;In the constraints for this data model, I just have the index. SO every event from this index should be in the report. &lt;/P&gt;

&lt;P&gt;The issue is the logs that have a missing field determined in the report query is not getting pickedup.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 21:13:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487660#M136242</guid>
      <dc:creator>pdantuuri0411</dc:creator>
      <dc:date>2019-09-18T21:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487661#M136243</link>
      <description>&lt;P&gt;Sounds like a usecase for fillnull search command:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/7.2.7/SearchReference/Fillnull"&gt;https://docs.splunk.com/Documentation/SplunkCloud/7.2.7/SearchReference/Fillnull&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 11:43:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487661#M136243</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-09-19T11:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487662#M136244</link>
      <description>&lt;P&gt;thank you for the reference @jkat54. I tried adding fillnull with different options but it did not resolve my issue. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | pivot servicestrafficcaapimodel servicesapiqads count(servicesapiqads) AS count SPLITROW _time AS _time PERIOD day SPLITROW service AS service SPLITROW operation AS operation SPLITROW method AS method SPLITROW principal AS principal SPLITROW systemid AS systemid TOP 100 count(servicesapiqads) ROWSUMMARY 0 COLSUMMARY 0 SHOWOTHER 1 | SORT -_time |  fillnull value=NULL
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Sep 2019 15:04:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487662#M136244</guid>
      <dc:creator>pdantuuri0411</dc:creator>
      <dc:date>2019-09-19T15:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487663#M136245</link>
      <description>&lt;P&gt;How about an eval on the datamodels definition instead..&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | eval field=if(isnull(field),"NULL",field)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Sep 2019 15:21:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487663#M136245</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-09-19T15:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487664#M136246</link>
      <description>&lt;P&gt;Thank you for your answer. I tried to add it in my data model and it works fine. But I couldn't save it there. So this is not reflecting in the report. &lt;/P&gt;

&lt;P&gt;my data model&lt;/P&gt;

&lt;P&gt;| from datamodel:"servicestrafficcaapimodel.servicesapiqads" | eval systemid=if(isnull(systemid),"NULL",systemid)  &lt;/P&gt;

&lt;P&gt;I don't have an option to save it. How do I reflect it in the report?&lt;/P&gt;

&lt;P&gt;Thank you again&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 16:12:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487664#M136246</guid>
      <dc:creator>pdantuuri0411</dc:creator>
      <dc:date>2019-09-19T16:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487665#M136247</link>
      <description>&lt;P&gt;Why can't you save the edits to your data model?&lt;/P&gt;

&lt;P&gt;You go to datasets, open the dataset/datamodels, click edit (or manage then edit), click add field, select eval expression from add field drop down, and you add the expression save and rebuild any summaries/access you have.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 20:53:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487665#M136247</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-09-19T20:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487666#M136248</link>
      <description>&lt;P&gt;I am trying the exact same thing. I put "systemid=if(isnull(systemid),"NULL",systemid)" in eval expression bar and I get the below error while previewing. Name of the field is systemid.&lt;/P&gt;

&lt;P&gt;"Error in 'eval' command: Fields cannot be assigned a boolean result. Instead, try if([bool expr], [expr], [expr])."&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 21:04:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487666#M136248</guid>
      <dc:creator>pdantuuri0411</dc:creator>
      <dc:date>2019-09-19T21:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Missing field values in report</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487667#M136249</link>
      <description>&lt;P&gt;Maybe it doesn't like "NULL"? Never seen that before.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 21:40:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-field-values-in-report/m-p/487667#M136249</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-09-19T21:40:02Z</dc:date>
    </item>
  </channel>
</rss>

