<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic subsearch results truncated as the number of entries in the lookup exceeded 10000 in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524835#M148060</link>
    <description>&lt;P&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;Using Splunk cloud I'm trying to look up the time difference between when a message is received from a sender and was delivered to a recipient. I have a lookup which has all the message ids totaling about 400k entries. For each message id, I'm interested in finding how long it took for the server to process the message.&amp;nbsp; Splunk seems to truncate the subsearch to 10000.&amp;nbsp; Here is what was noticed for the search below:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Subsearch produced 423340 results, truncating to maxout 10000.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;index="stage" (host="msgsrv*" source="/var/log/messaging/msg.log" [|inputlookup sept-messages | fields id ]&lt;BR /&gt;(&lt;BR /&gt;&lt;BR /&gt;( event=msg_rcvd AND "tag=""body""") OR ( event=msg_sent AND "tag=""body""") OR (event=msg_sent AND "tag=""result""")&lt;BR /&gt;)&lt;BR /&gt;)&lt;/P&gt;&lt;P&gt;|reverse&lt;BR /&gt;|eval msg_id = id&lt;BR /&gt;|eval msg_rcvd_time=if(event == "msg_rcvd", _time, 999999999999.999)&lt;BR /&gt;|eval client_out_time=if(event == "msg_sent", _time,999999999999.999)&lt;BR /&gt;|stats values(msg_rcvd_time) AS ins values(msg_sent_time) AS outs values(_time) AS times values(_raw) as raws values(to_user) AS to_users values(from_user) AS from_users by msg_id, to_user&lt;BR /&gt;|eval first_msg_rcvd_time = mvindex(mvsort(ins), 0)&lt;BR /&gt;|eval first_msg_sent_time = mvindex(mvsort(outs), 0)&lt;BR /&gt;|eval delta = first_msg_sent_time - first_msg_rcvd_time&lt;/P&gt;&lt;P&gt;How could the large lookup be processed and any suggestions for improving the above query?&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2020 12:19:26 GMT</pubDate>
    <dc:creator>sravipati</dc:creator>
    <dc:date>2020-10-15T12:19:26Z</dc:date>
    <item>
      <title>subsearch results truncated as the number of entries in the lookup exceeded 10000</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524835#M148060</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;Using Splunk cloud I'm trying to look up the time difference between when a message is received from a sender and was delivered to a recipient. I have a lookup which has all the message ids totaling about 400k entries. For each message id, I'm interested in finding how long it took for the server to process the message.&amp;nbsp; Splunk seems to truncate the subsearch to 10000.&amp;nbsp; Here is what was noticed for the search below:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Subsearch produced 423340 results, truncating to maxout 10000.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;index="stage" (host="msgsrv*" source="/var/log/messaging/msg.log" [|inputlookup sept-messages | fields id ]&lt;BR /&gt;(&lt;BR /&gt;&lt;BR /&gt;( event=msg_rcvd AND "tag=""body""") OR ( event=msg_sent AND "tag=""body""") OR (event=msg_sent AND "tag=""result""")&lt;BR /&gt;)&lt;BR /&gt;)&lt;/P&gt;&lt;P&gt;|reverse&lt;BR /&gt;|eval msg_id = id&lt;BR /&gt;|eval msg_rcvd_time=if(event == "msg_rcvd", _time, 999999999999.999)&lt;BR /&gt;|eval client_out_time=if(event == "msg_sent", _time,999999999999.999)&lt;BR /&gt;|stats values(msg_rcvd_time) AS ins values(msg_sent_time) AS outs values(_time) AS times values(_raw) as raws values(to_user) AS to_users values(from_user) AS from_users by msg_id, to_user&lt;BR /&gt;|eval first_msg_rcvd_time = mvindex(mvsort(ins), 0)&lt;BR /&gt;|eval first_msg_sent_time = mvindex(mvsort(outs), 0)&lt;BR /&gt;|eval delta = first_msg_sent_time - first_msg_rcvd_time&lt;/P&gt;&lt;P&gt;How could the large lookup be processed and any suggestions for improving the above query?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 12:19:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524835#M148060</guid>
      <dc:creator>sravipati</dc:creator>
      <dc:date>2020-10-15T12:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: subsearch results truncated as the number of entries in the lookup exceeded 10000</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524846#M148064</link>
      <description>&lt;P&gt;There should be some way about picking up only the first and last event and finding the time difference.. i am not sure how to do that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;meanwhile, if you want to update the subsearch limitation of 10000 (splunk cloud customers will need to contact splunk support)&lt;BR /&gt;&lt;BR /&gt;limits.conf file:&lt;/P&gt;&lt;P&gt;[subsearch]&lt;BR /&gt;* This stanza controls subsearch results.&lt;BR /&gt;* NOTE: This stanza DOES NOT control subsearch results when a subsearch is called by&lt;BR /&gt;commands such as join, append, or appendcols.&lt;BR /&gt;* Read more about subsearches in the online documentation:&lt;BR /&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Search/Aboutsubsearches" rel="nofollow noopener noreferrer" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Search/Aboutsubsearches&lt;/A&gt;&lt;/P&gt;&lt;P&gt;maxout =&lt;BR /&gt;* Maximum number of results to return from a subsearch.&lt;BR /&gt;* This value cannot be greater than or equal to 10500.&lt;BR /&gt;* Defaults to 10000.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 13:03:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524846#M148064</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2020-10-15T13:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: subsearch results truncated as the number of entries in the lookup exceeded 10000</title>
      <link>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524850#M148066</link>
      <description>&lt;P&gt;Thank you. Sure will look into that option of increasing. Wondering how large of a value is acceptable though?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 13:14:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/subsearch-results-truncated-as-the-number-of-entries-in-the/m-p/524850#M148066</guid>
      <dc:creator>sravipati</dc:creator>
      <dc:date>2020-10-15T13:14:34Z</dc:date>
    </item>
  </channel>
</rss>

