<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Field appearing as null in table when too long in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535121#M151244</link>
    <description>&lt;P&gt;Query (with some data blocked out):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="x" host=x source=x sourcetype = x | rename "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.endTime" as End, "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.startTime" as Start, "protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query" as "Query" | eval Query_Duration=strptime(End,"%Y-%m-%dT%H:%M:%S.%N")-strptime(Start,"%Y-%m-%dT%H:%M:%S.%N") | sort -Query_Duration limit=5 | table Start End "Query" Query_Duration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the raw data on the search results&lt;/P&gt;&lt;P&gt;"protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query"&lt;BR /&gt;starts with&lt;/P&gt;&lt;P&gt;"MERGE INTO\n `project.dataset.table`... "&lt;/P&gt;&lt;P&gt;But in the table format, "Query" ends up as null (only for some rows!)&lt;/P&gt;&lt;P&gt;Is the whole "Query" field required? If so I'll have to block out quite a bit of info. Is there anything I should look for in this "Query" field to troubleshoot?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Jan 2021 22:27:15 GMT</pubDate>
    <dc:creator>sk</dc:creator>
    <dc:date>2021-01-07T22:27:15Z</dc:date>
    <item>
      <title>Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535114#M151240</link>
      <description>&lt;P&gt;I am searching for queries that are running over a certain amount of time and displaying start/end time and query in a table.&lt;/P&gt;&lt;P&gt;For some rows, the query is null but when I look at the event, the field has a value. The value is very long though.&lt;/P&gt;&lt;P&gt;Is there a limit on the number of characters that can be displayed in a field on a table?&lt;/P&gt;&lt;P&gt;I have tried using substring to bring back only a few characters. This will work for the values already being displayed but the value I want to see is still null.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 21:58:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535114#M151240</guid>
      <dc:creator>sk</dc:creator>
      <dc:date>2021-01-07T21:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535116#M151242</link>
      <description>&lt;P&gt;Can you provide your query and an example of the data. There should be no real limits to the field size, so if the field is null, there is something else going on.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 22:02:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535116#M151242</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-01-07T22:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535121#M151244</link>
      <description>&lt;P&gt;Query (with some data blocked out):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="x" host=x source=x sourcetype = x | rename "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.endTime" as End, "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.startTime" as Start, "protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query" as "Query" | eval Query_Duration=strptime(End,"%Y-%m-%dT%H:%M:%S.%N")-strptime(Start,"%Y-%m-%dT%H:%M:%S.%N") | sort -Query_Duration limit=5 | table Start End "Query" Query_Duration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the raw data on the search results&lt;/P&gt;&lt;P&gt;"protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query"&lt;BR /&gt;starts with&lt;/P&gt;&lt;P&gt;"MERGE INTO\n `project.dataset.table`... "&lt;/P&gt;&lt;P&gt;But in the table format, "Query" ends up as null (only for some rows!)&lt;/P&gt;&lt;P&gt;Is the whole "Query" field required? If so I'll have to block out quite a bit of info. Is there anything I should look for in this "Query" field to troubleshoot?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 22:27:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535121#M151244</guid>
      <dc:creator>sk</dc:creator>
      <dc:date>2021-01-07T22:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535128#M151247</link>
      <description>&lt;P&gt;Also, the query value actually ends with&amp;nbsp;&lt;/P&gt;&lt;P&gt;" number,\n ..&lt;STRONG&gt;.(string is too long)&lt;/STRONG&gt;" in the source system logs.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 00:20:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535128#M151247</guid>
      <dc:creator>sk</dc:creator>
      <dc:date>2021-01-08T00:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535136#M151250</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/230290"&gt;@sk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It sounds like your field extraction is not extracting the&amp;nbsp;&lt;SPAN&gt;protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query field&lt;/SPAN&gt;&amp;nbsp;correctly.&lt;/P&gt;&lt;P&gt;Is this raw data JSON? What is the size of the raw data length? By default Splunk will auto extract fields from a JSON payload up to the first 5000 characters.&lt;/P&gt;&lt;P&gt;From limits.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[spath]
# Number of characters to read from an XML or JSON event when
# auto extracting.
extraction_cutoff = 5000
extract_all = true&lt;/LI-CODE&gt;&lt;P&gt;If this is the issue, then you will need to do manual spath statements to extract the JSON you want, e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| spath input=protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query path=query&lt;/LI-CODE&gt;&lt;P&gt;If it's not JSON, it's still about how your data is being extracted from the _raw to the fields and there will be something in the data that is breaking whatever rules you have.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 02:53:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535136#M151250</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-01-08T02:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535254#M151278</link>
      <description>&lt;P&gt;Thanks for your information&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="x" host=x source=x sourcetype = x | rename "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.endTime" as End, "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.startTime" as Start | &lt;STRONG&gt;spath input=protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query output=Query path=protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query&lt;/STRONG&gt; | eval Query_Duration=strptime(End,"%Y-%m-%dT%H:%M:%S.%N")-strptime(Start,"%Y-%m-%dT%H:%M:%S.%N") | sort -Query_Duration limit=10 | table Start End "Query" Query_Duration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;index="x" host=x source=x sourcetype = x | rename "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.endTime" as End, "protoPayload.serviceData.jobCompletedEvent.job.jobStatistics.startTime" as Start | &lt;STRONG&gt;spath input=protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query path=Query&lt;/STRONG&gt; | eval Query_Duration=strptime(End,"%Y-%m-%dT%H:%M:%S.%N")-strptime(Start,"%Y-%m-%dT%H:%M:%S.%N") | sort -Query_Duration limit=10 | table Start End "Query" Query_Duration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But now the Query column on the table is null for all rows. Am I misunderstanding the spath parameters?&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jan 2021 00:00:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535254#M151278</guid>
      <dc:creator>sk</dc:creator>
      <dc:date>2021-01-09T00:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535282#M151281</link>
      <description>&lt;P&gt;It depends on what the fields actually are, but using _raw will probably work, as long as the data is JSON, e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| spath input=_raw path=protoPayload.serviceData.jobCompletedEvent.job.jobConfiguration.query.query output=Query&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;which would get the value of the lowest level query element&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 00:43:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535282#M151281</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-01-11T00:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Field appearing as null in table when too long</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535396#M151312</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;Thank you kindly! This works great!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 20:02:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-appearing-as-null-in-table-when-too-long/m-p/535396#M151312</guid>
      <dc:creator>sk</dc:creator>
      <dc:date>2021-01-11T20:02:21Z</dc:date>
    </item>
  </channel>
</rss>

