<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: mvexpand memory issue in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548454#M155569</link>
    <description>&lt;P&gt;Hi @ITWhisperer,&lt;/P&gt;&lt;P&gt;Thanks to both you and &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;. I have attached my search below, can you please check and assist in tweaking based on your above response?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in -advance!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval Asset_Category=mvrange(0,mvcount(CATEGORY))
| mvexpand Asset_Category
| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)

| rename cvss2_base_score AS CVSS_Score_v2, cvssV3BaseScore AS CVSS_Score_v3, cve AS CVE, plugin_id AS Plugin_ID

| lookup cvss_score_v2_nvd_severity CVSS_Score_v2 AS CVSS_Score_v2 OUTPUT NVD_Severity_v2
| lookup cvss_score_v3_nvd_severity    CVSS_Score_v3 AS CVSS_Score_v3 OUTPUT NVD_Severity_v3

| eval First_Seen_Date=strftime(First_Seen_Date,"%m/%d/%y %H:%M:%S")

| eval Age_Days=ceiling((now()-strptime(First_Seen_Date,"%m/%d/%y"))/86400)
| eval CVE_Age=case(
Age_Days&amp;lt;30,"A_0 to 29 Days",
Age_Days&amp;gt;=365,"G_365 Days+",
Age_Days&amp;gt;=180,"F_180 to 364 Days",
Age_Days&amp;gt;=120,"E_120 to 179 Days",
Age_Days&amp;gt;=90,"D_90 to 119 Days",
Age_Days&amp;gt;=60,"C_60 to 89 Days",
Age_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_No Age Data")

| eval Remediation_Status=case(
State="fixed","Remediated",
State="open","Not_Remediated",
State="reopened","Not_Remediated")

| eval Time_to_Remediation_Days=if(Remediation_Status=="Remediated",'Age_Days',"Not_Remediated_Yet")

| eval CVE_Age_Remediation=case(
Time_to_Remediation_Days&amp;lt;30,"A_0 to 29 Days",
Time_to_Remediation_Days&amp;gt;=365,"G_365 Days+",
Time_to_Remediation_Days&amp;gt;=180,"F_180 to 364 Days",
Time_to_Remediation_Days&amp;gt;=120,"E_120 to 179 Days",
Time_to_Remediation_Days&amp;gt;=90,"D_90 to 119 Days",
Time_to_Remediation_Days&amp;gt;=60,"C_60 to 89 Days",
Time_to_Remediation_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_Not Remediated Yet")

| eval Tenable_Severity = upper(Tenable_Severity)

| fields Plugin_ID, CVE, CVSS_Score_v2, CVSS_Score_v3, NVD_Severity_v2, NVD_Severity_v3, Tenable_Severity, VPR_Score, First_Seen_Date, Age_Days, CVE_Age, State, Remediation_Status, Time_to_Remediation_Days, CVE_Age_Remediation, Affected_IP_Count, Affected_DNS_Count, Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Apr 2021 15:13:24 GMT</pubDate>
    <dc:creator>mbasharat</dc:creator>
    <dc:date>2021-04-19T15:13:24Z</dc:date>
    <item>
      <title>mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548368#M155538</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have very large dataset that appears as multivalued as below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults

| eval data1="Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10"
| eval data2="LAPTOP PC,SERVER,APPLIANCE,DESKTOP,ROUTER,SWITCH"

| makemv delim="," data1
| makemv delim="," data2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I try to use &lt;STRONG&gt;mvexpand&lt;/STRONG&gt; using below technique, it exceeds default memory limit of 500MB. I did increase it to 5000MB but problem remains. I did try to limit _raw and multiple other techniques but to no avail. &lt;STRONG&gt;I can not use stats because cardinality is high as I have more fields, ~ 8 fields to expand&lt;/STRONG&gt;. Below is a great solution which I have been using at many places for smaller dataset but not for larger dataset. For example, my saved search produces ~6000 records. When those records are to be expanded, I am expecting them to be around 30,000 rows. I need output to be like below but without &lt;STRONG&gt;mvexpand&amp;nbsp;&lt;/STRONG&gt;so we do not have to worry about mvexpand memory limits yet still get complete dataset as needed.&amp;nbsp;Is this possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults

| eval data1="Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10"
| eval data2="LAPTOP PC,SERVER,APPLIANCE,DESKTOP,ROUTER,SWITCH"

| makemv delim="," data1
| makemv delim="," data2

| eval Asset_Category=mvrange(0,mvcount(data1))
| mvexpand Asset_Category
| eval data1=mvindex(data1,Asset_Category)
| eval data2=mvindex(data2,Asset_Category)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in-advance!!!!&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 01:37:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548368#M155538</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-19T01:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548372#M155539</link>
      <description>&lt;P&gt;Depending on what fields you absolutely need AFTER the mvexpand, try first to remove any fields you will not use after you have expanded the events. If you are working with the raw events but also have fields extracted, then remove _raw if you do not need it any more.&lt;/P&gt;&lt;P&gt;From your question, I understand that you want to add expand the rows, so there is one row for each of the&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10&lt;/LI-CODE&gt;&lt;P&gt;attributes.&lt;/P&gt;&lt;P&gt;You should also NOT create the multi value fields BEFORE you mvexpand as Splunk then has to expand all those fields too.&lt;/P&gt;&lt;P&gt;Do this AFTER the expansion, e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults

| eval Asset_Category=mvrange(0,mvcount(split("Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10", ","))
| mvexpand Asset_Category
| eval data1=mvindex(split("Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10", ","),Asset_Category)
| eval data2=mvindex(split("LAPTOP PC,SERVER,APPLIANCE,DESKTOP,ROUTER,SWITCH", ","),Asset_Category)&lt;/LI-CODE&gt;&lt;P&gt;There is no point in expanding all the multi-value fields, as all you are trying to do is to get a SINGLE value corresponding to Asset_Category in each of the expanded events&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 03:43:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548372#M155539</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-04-19T03:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548428#M155555</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I have tried all that but to no avail. See my search below:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval Asset_Category=mvrange(0,mvcount(CATEGORY))
| mvexpand Asset_Category
| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)

| rename cvss2_base_score AS CVSS_Score_v2, cvssV3BaseScore AS CVSS_Score_v3, cve AS CVE, plugin_id AS Plugin_ID

| lookup cvss_score_v2_nvd_severity CVSS_Score_v2 AS CVSS_Score_v2 OUTPUT NVD_Severity_v2
| lookup cvss_score_v3_nvd_severity    CVSS_Score_v3 AS CVSS_Score_v3 OUTPUT NVD_Severity_v3

| eval First_Seen_Date=strftime(First_Seen_Date,"%m/%d/%y %H:%M:%S")

| eval Age_Days=ceiling((now()-strptime(First_Seen_Date,"%m/%d/%y"))/86400)
| eval CVE_Age=case(
Age_Days&amp;lt;30,"A_0 to 29 Days",
Age_Days&amp;gt;=365,"G_365 Days+",
Age_Days&amp;gt;=180,"F_180 to 364 Days",
Age_Days&amp;gt;=120,"E_120 to 179 Days",
Age_Days&amp;gt;=90,"D_90 to 119 Days",
Age_Days&amp;gt;=60,"C_60 to 89 Days",
Age_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_No Age Data")

| eval Remediation_Status=case(
State="fixed","Remediated",
State="open","Not_Remediated",
State="reopened","Not_Remediated")

| eval Time_to_Remediation_Days=if(Remediation_Status=="Remediated",'Age_Days',"Not_Remediated_Yet")

| eval CVE_Age_Remediation=case(
Time_to_Remediation_Days&amp;lt;30,"A_0 to 29 Days",
Time_to_Remediation_Days&amp;gt;=365,"G_365 Days+",
Time_to_Remediation_Days&amp;gt;=180,"F_180 to 364 Days",
Time_to_Remediation_Days&amp;gt;=120,"E_120 to 179 Days",
Time_to_Remediation_Days&amp;gt;=90,"D_90 to 119 Days",
Time_to_Remediation_Days&amp;gt;=60,"C_60 to 89 Days",
Time_to_Remediation_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_Not Remediated Yet")

| eval Tenable_Severity = upper(Tenable_Severity)

| fields Plugin_ID, CVE, CVSS_Score_v2, CVSS_Score_v3, NVD_Severity_v2, NVD_Severity_v3, Tenable_Severity, VPR_Score, First_Seen_Date, Age_Days, CVE_Age, State, Remediation_Status, Time_to_Remediation_Days, CVE_Age_Remediation, Affected_IP_Count, Affected_DNS_Count, Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 19 Apr 2021 13:43:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548428#M155555</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-19T13:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548444#M155566</link>
      <description>&lt;P&gt;Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults

| eval data1="Windows_7,Unknown,Windows_2012,Windows_7,Windows_8,Windows_10"
| eval data2="LAPTOP PC,SERVER,APPLIANCE,DESKTOP,ROUTER,SWITCH"
| append 
    [| makeresults

| eval data1="Unknown,Windows_2012,Windows_7,Windows_8,Windows_10"
| eval data2="LAPTOP PC,APPLIANCE,ROUTER,SWITCH,DESKTOP"
]
| makemv delim="," data1
| makemv delim="," data2
| streamstats count as row
| eval subrows=mvcount(data1)
| streamstats sum(subrows) as subrow
| eval topsubrow=subrow
| append
    [| makeresults
    | eval subrow=1
    ]
| fields - _time
| makecontinuous subrow
| sort - subrow
| filldown
| eval data1=mvindex(data1,topsubrow-subrow)
| eval data2=mvindex(data2,topsubrow-subrow)&lt;/LI-CODE&gt;&lt;P&gt;I added an extra event to show it working across multiple events. The only gotcha is if the first event has only one multi-value, but this can gotten around with a bit more SPL.&lt;/P&gt;&lt;P&gt;If the order of the subrows is important/needs to be preserved, you just need to do an extra calculation with the mvindex.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 14:27:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548444#M155566</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-19T14:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548454#M155569</link>
      <description>&lt;P&gt;Hi @ITWhisperer,&lt;/P&gt;&lt;P&gt;Thanks to both you and &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;. I have attached my search below, can you please check and assist in tweaking based on your above response?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in -advance!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval Asset_Category=mvrange(0,mvcount(CATEGORY))
| mvexpand Asset_Category
| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)

| rename cvss2_base_score AS CVSS_Score_v2, cvssV3BaseScore AS CVSS_Score_v3, cve AS CVE, plugin_id AS Plugin_ID

| lookup cvss_score_v2_nvd_severity CVSS_Score_v2 AS CVSS_Score_v2 OUTPUT NVD_Severity_v2
| lookup cvss_score_v3_nvd_severity    CVSS_Score_v3 AS CVSS_Score_v3 OUTPUT NVD_Severity_v3

| eval First_Seen_Date=strftime(First_Seen_Date,"%m/%d/%y %H:%M:%S")

| eval Age_Days=ceiling((now()-strptime(First_Seen_Date,"%m/%d/%y"))/86400)
| eval CVE_Age=case(
Age_Days&amp;lt;30,"A_0 to 29 Days",
Age_Days&amp;gt;=365,"G_365 Days+",
Age_Days&amp;gt;=180,"F_180 to 364 Days",
Age_Days&amp;gt;=120,"E_120 to 179 Days",
Age_Days&amp;gt;=90,"D_90 to 119 Days",
Age_Days&amp;gt;=60,"C_60 to 89 Days",
Age_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_No Age Data")

| eval Remediation_Status=case(
State="fixed","Remediated",
State="open","Not_Remediated",
State="reopened","Not_Remediated")

| eval Time_to_Remediation_Days=if(Remediation_Status=="Remediated",'Age_Days',"Not_Remediated_Yet")

| eval CVE_Age_Remediation=case(
Time_to_Remediation_Days&amp;lt;30,"A_0 to 29 Days",
Time_to_Remediation_Days&amp;gt;=365,"G_365 Days+",
Time_to_Remediation_Days&amp;gt;=180,"F_180 to 364 Days",
Time_to_Remediation_Days&amp;gt;=120,"E_120 to 179 Days",
Time_to_Remediation_Days&amp;gt;=90,"D_90 to 119 Days",
Time_to_Remediation_Days&amp;gt;=60,"C_60 to 89 Days",
Time_to_Remediation_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_Not Remediated Yet")

| eval Tenable_Severity = upper(Tenable_Severity)

| fields Plugin_ID, CVE, CVSS_Score_v2, CVSS_Score_v3, NVD_Severity_v2, NVD_Severity_v3, Tenable_Severity, VPR_Score, First_Seen_Date, Age_Days, CVE_Age, State, Remediation_Status, Time_to_Remediation_Days, CVE_Age_Remediation, Affected_IP_Count, Affected_DNS_Count, Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 15:13:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548454#M155569</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-19T15:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548461#M155573</link>
      <description>&lt;P&gt;Try something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval subrows=mvcount(CATEGORY)
| streamstats sum(subrows) as subrow
| eval topsubrow=subrow
| append
    [| makeresults
    | eval subrow=1
    ]
| fields - _time
| makecontinuous subrow
| sort - subrow
| filldown
| eval Asset_Category=topsubrow-subrow

| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)

| rename cvss2_base_score AS CVSS_Score_v2, cvssV3BaseScore AS CVSS_Score_v3, cve AS CVE, plugin_id AS Plugin_ID

| lookup cvss_score_v2_nvd_severity CVSS_Score_v2 AS CVSS_Score_v2 OUTPUT NVD_Severity_v2
| lookup cvss_score_v3_nvd_severity    CVSS_Score_v3 AS CVSS_Score_v3 OUTPUT NVD_Severity_v3

| eval First_Seen_Date=strftime(First_Seen_Date,"%m/%d/%y %H:%M:%S")

| eval Age_Days=ceiling((now()-strptime(First_Seen_Date,"%m/%d/%y"))/86400)
| eval CVE_Age=case(
Age_Days&amp;lt;30,"A_0 to 29 Days",
Age_Days&amp;gt;=365,"G_365 Days+",
Age_Days&amp;gt;=180,"F_180 to 364 Days",
Age_Days&amp;gt;=120,"E_120 to 179 Days",
Age_Days&amp;gt;=90,"D_90 to 119 Days",
Age_Days&amp;gt;=60,"C_60 to 89 Days",
Age_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_No Age Data")

| eval Remediation_Status=case(
State="fixed","Remediated",
State="open","Not_Remediated",
State="reopened","Not_Remediated")

| eval Time_to_Remediation_Days=if(Remediation_Status=="Remediated",'Age_Days',"Not_Remediated_Yet")

| eval CVE_Age_Remediation=case(
Time_to_Remediation_Days&amp;lt;30,"A_0 to 29 Days",
Time_to_Remediation_Days&amp;gt;=365,"G_365 Days+",
Time_to_Remediation_Days&amp;gt;=180,"F_180 to 364 Days",
Time_to_Remediation_Days&amp;gt;=120,"E_120 to 179 Days",
Time_to_Remediation_Days&amp;gt;=90,"D_90 to 119 Days",
Time_to_Remediation_Days&amp;gt;=60,"C_60 to 89 Days",
Time_to_Remediation_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_Not Remediated Yet")

| eval Tenable_Severity = upper(Tenable_Severity)

| fields Plugin_ID, CVE, CVSS_Score_v2, CVSS_Score_v3, NVD_Severity_v2, NVD_Severity_v3, Tenable_Severity, VPR_Score, First_Seen_Date, Age_Days, CVE_Age, State, Remediation_Status, Time_to_Remediation_Days, CVE_Age_Remediation, Affected_IP_Count, Affected_DNS_Count, Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 19 Apr 2021 15:42:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548461#M155573</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-19T15:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548518#M155589</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/86891"&gt;@mbasharat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like you are still expanding all the multivalue fields. Your lookup is BEFORE the mvexpand and from the eval statements following, those are the fields causing the memory overflow.&lt;/P&gt;&lt;P&gt;If you place the lookup AFTER the mvexpand like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| lookup vuln_affected_entities_info CVE AS cve OUTPUT CATEGORY
| eval Asset_Category=mvrange(0,mvcount(CATEGORY))
| mvexpand Asset_Category

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type,  KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)&lt;/LI-CODE&gt;&lt;P&gt;So, you do a simple lookup to get CATEGORY to get the count to expand, then do the expansion followed by a lookup that will then give you all the MV fields from the lookup, which you then mvindex out.&lt;/P&gt;&lt;P&gt;This is a very simple change that avoids mvexpand having to add all the MV fields. Adding those fields after the expansion achieves the same thing but doesn't hit the memory limits of mvexpand.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 23:07:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548518#M155589</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-04-19T23:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548590#M155621</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Your provided solution works. However, I am getting below error:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Unexpected duplicate values in field 'subrow' have been detected.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 13:57:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548590#M155621</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T13:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548593#M155623</link>
      <description>&lt;P&gt;This is because the first row has only a single value in the multi-value field which is the gotcha I mentioned earlier. I will try and dig out the solution to that and repost.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:13:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548593#M155623</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T14:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548595#M155625</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to previous error I mentioned, I am also seeing stripped results and below error:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The specified span would result in too many (&amp;gt;250000) rows.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:26:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548595#M155625</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T14:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548596#M155626</link>
      <description>&lt;P&gt;OK I added a couple of lines before the makecontinuous to effectively remove the additional event if the mvcount for the first original event is 1&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| eval subrows=mvcount(CATEGORY)
| streamstats sum(subrows) as subrow
| eval topsubrow=subrow
| append
    [| makeresults
    | eval subrow=1
    ]
| fields - _time
| eventstats min(topsubrow) as firsttop
| where isnotnull(topsubrow) or topsubrow != firsttop
| makecontinuous subrow
| sort - subrow
| filldown
| eval Asset_Category=topsubrow-subrow

| eval Scan_Type=mvindex(Scan_Type,Asset_Category)
| eval CATEGORY=mvindex(CATEGORY,Asset_Category)
| eval KISAM_OS_Grouped=mvindex(KISAM_OS_Grouped,Asset_Category)
| eval Nessus_OS_Grouped=mvindex(Nessus_OS_Grouped,Asset_Category)
| eval EOPS_Assignment_Group=mvindex(EOPS_Assignment_Group,Asset_Category)
| eval Responsible_Organization=mvindex(Responsible_Organization,Asset_Category)
| eval KISAM_GSS=mvindex(KISAM_GSS,Asset_Category)
| eval Project_Type=mvindex(Project_Type,Asset_Category)
| eval KISAM_Projects=mvindex(KISAM_Projects,Asset_Category)
| eval UCMDB_Environment=mvindex(UCMDB_Environment,Asset_Category)
| eval Boundary_Name=mvindex(Boundary_Name,Asset_Category)
| eval Boundary_System=mvindex(Boundary_System,Asset_Category)

| rename cvss2_base_score AS CVSS_Score_v2, cvssV3BaseScore AS CVSS_Score_v3, cve AS CVE, plugin_id AS Plugin_ID

| lookup cvss_score_v2_nvd_severity CVSS_Score_v2 AS CVSS_Score_v2 OUTPUT NVD_Severity_v2
| lookup cvss_score_v3_nvd_severity    CVSS_Score_v3 AS CVSS_Score_v3 OUTPUT NVD_Severity_v3

| eval First_Seen_Date=strftime(First_Seen_Date,"%m/%d/%y %H:%M:%S")

| eval Age_Days=ceiling((now()-strptime(First_Seen_Date,"%m/%d/%y"))/86400)
| eval CVE_Age=case(
Age_Days&amp;lt;30,"A_0 to 29 Days",
Age_Days&amp;gt;=365,"G_365 Days+",
Age_Days&amp;gt;=180,"F_180 to 364 Days",
Age_Days&amp;gt;=120,"E_120 to 179 Days",
Age_Days&amp;gt;=90,"D_90 to 119 Days",
Age_Days&amp;gt;=60,"C_60 to 89 Days",
Age_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_No Age Data")

| eval Remediation_Status=case(
State="fixed","Remediated",
State="open","Not_Remediated",
State="reopened","Not_Remediated")

| eval Time_to_Remediation_Days=if(Remediation_Status=="Remediated",'Age_Days',"Not_Remediated_Yet")

| eval CVE_Age_Remediation=case(
Time_to_Remediation_Days&amp;lt;30,"A_0 to 29 Days",
Time_to_Remediation_Days&amp;gt;=365,"G_365 Days+",
Time_to_Remediation_Days&amp;gt;=180,"F_180 to 364 Days",
Time_to_Remediation_Days&amp;gt;=120,"E_120 to 179 Days",
Time_to_Remediation_Days&amp;gt;=90,"D_90 to 119 Days",
Time_to_Remediation_Days&amp;gt;=60,"C_60 to 89 Days",
Time_to_Remediation_Days&amp;gt;=30,"B_30 to 59 Days",
0==0,"H_Not Remediated Yet")

| eval Tenable_Severity = upper(Tenable_Severity)

| fields Plugin_ID, CVE, CVSS_Score_v2, CVSS_Score_v3, NVD_Severity_v2, NVD_Severity_v3, Tenable_Severity, VPR_Score, First_Seen_Date, Age_Days, CVE_Age, State, Remediation_Status, Time_to_Remediation_Days, CVE_Age_Remediation, Affected_IP_Count, Affected_DNS_Count, Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:31:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548596#M155626</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T14:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548598#M155628</link>
      <description>&lt;P&gt;Thank you!!!&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;. Awaiting response.&lt;/P&gt;&lt;P&gt;So still need complete dataset and no results truncation pls.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:35:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548598#M155628</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T14:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548600#M155630</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I am also testing your providing solution parallel. Will report back shortly. TY!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:38:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548600#M155630</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T14:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548602#M155632</link>
      <description>&lt;P&gt;Sounds like you need to increase your limits.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:43:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548602#M155632</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T14:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548606#M155634</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just tried and same issue! &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 15:06:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548606#M155634</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T15:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548619#M155637</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same error + truncated results/rows.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Unexpected duplicate values in field 'subrow' have been detected.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 15:29:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548619#M155637</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T15:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548621#M155638</link>
      <description>&lt;P&gt;Do you have any events where CATEGORY is null? This would cause a problem. If so, presumably these events can be removed?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| where isnotnull(CATEGORY)
| eval subrows=mvcount(CATEGORY)&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 20 Apr 2021 15:36:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548621#M155638</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T15:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548625#M155641</link>
      <description>&lt;P&gt;I do have NULLs in the data but they have to be included. If it helps, see attached screenshot. Thats how fields from lookup get output.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="test.jpg" style="width: 785px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/13854iD8A78D78B5E02807/image-dimensions/785x210?v=v2" width="785" height="210" role="button" title="test.jpg" alt="test.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 15:56:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548625#M155641</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T15:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548629#M155643</link>
      <description>&lt;P&gt;The issue would be if specifically CATEGORY is null, which it isn't in your screenshot. Can you try this to see if you get any events?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus sourcetype="tenable:sc:vuln" severity!=informational ip=* dnsName=*

| fields - index, source, sourcetype, splunk_server, splunk_server_group, host, eventtype, field, linecount, punct, tag, tag::eventtype, _raw

| fields ip, dnsName, firstSeen, plugin_id, cve, cvss2_base_score, cvssV3BaseScore, severity, vprScore, state

| makemv delim="," cve

| stats

dc(ip) AS Affected_IP_Count,
dc(dnsName) AS Affected_DNS_Count,
latest(firstSeen) AS First_Seen_Date,
latest(state) AS State,
latest(vprScore) AS VPR_Score,
latest(severity) AS Tenable_Severity,
latest(cvss2_base_score) AS cvss2_base_score,
latest(cvssV3BaseScore) AS cvssV3BaseScore

by plugin_id, cve

| lookup vuln_affected_entities_info CVE AS cve OUTPUT Scan_Type, CATEGORY, KISAM_OS_Grouped, Nessus_OS_Grouped, EOPS_Assignment_Group, Responsible_Organization, KISAM_GSS, Project_Type, KISAM_Projects, UCMDB_Environment, Boundary_Name, Boundary_System

| where isnull(CATEGORY)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;If you do, what does that mean for the "mvexpand"?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 16:15:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548629#M155643</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T16:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand memory issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548633#M155646</link>
      <description>&lt;P&gt;&lt;A href="mailto:Hi@IT" target="_blank"&gt;Hi @ITWhisperer&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It has some nulls/unknowns. This means that asset does not have a category but there is organization, gss, etc. so yes, there is other data as aforementioned which means I have to find a solution to replace mvexpand but still get all rows expanded.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 16:31:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-memory-issue/m-p/548633#M155646</guid>
      <dc:creator>mbasharat</dc:creator>
      <dc:date>2021-04-20T16:31:59Z</dc:date>
    </item>
  </channel>
</rss>

