<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inputlookup search and join in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/594988#M207048</link>
    <description>&lt;P&gt;I'm not gonna answer your question as such but I'll point out two strange things about your search.&lt;/P&gt;&lt;P&gt;One is the unnecessary statsing over tstats. Why doing tstats over _time only to stats the results in the next step? You would be ok with just tstatsing over the rest of the fields, without _time . And this actually might be the reason for your subsearch terminating prematurely if it's being processed for too long. The subsearch would then silently fail and you'd get incomplete data.&lt;/P&gt;&lt;P&gt;But another thing is that you actually don't do it this way to have reliable results quickly.&lt;/P&gt;&lt;P&gt;I'd advise the reverse approach - calculate tstats over your indexes, then add "empty" results from your list of metadata and sum.&lt;/P&gt;&lt;PRE&gt;| tstats count by index sourcetype host &lt;BR /&gt;| append&lt;BR /&gt;&amp;nbsp; [ | inputlookup mylookuptable.csv&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | table index sourcetype host&lt;BR /&gt;&amp;nbsp;&amp;nbsp; | eval count=0 ]&lt;BR /&gt;| stats sum(count) as count by index sourcetype host&lt;BR /&gt;| where count=0&lt;/PRE&gt;</description>
    <pubDate>Sat, 23 Apr 2022 05:25:17 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2022-04-23T05:25:17Z</dc:date>
    <item>
      <title>Why search not displaying results for those values only if any index/sourcetype is missing logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/594979#M207043</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After reviewing most of the posts and not finding a solution. I finally came here to ask for help related to my query problem.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a lookup table which runs sweeps to check if logs are missing in any particular index/host. My query was working like a charm from last two years, but suddenly, it started to show FPs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My query =&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;| inputlookup mylookuptable.csv | table index sourcetype host
| join index sourcetype host type=left [| tstats count where index=* sourcetype=* host=* by _time index sourcetype host | stats count by index sourcetype host]
| fillnull value=0
| search count = 0&lt;/PRE&gt;
&lt;P&gt;Can someone please help me understand why its not displaying results for those values only if any index/sourcetype is missing logs?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 14:58:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/594979#M207043</guid>
      <dc:creator>davinder_kaur</dc:creator>
      <dc:date>2022-04-25T14:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inputlookup search and join</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/594988#M207048</link>
      <description>&lt;P&gt;I'm not gonna answer your question as such but I'll point out two strange things about your search.&lt;/P&gt;&lt;P&gt;One is the unnecessary statsing over tstats. Why doing tstats over _time only to stats the results in the next step? You would be ok with just tstatsing over the rest of the fields, without _time . And this actually might be the reason for your subsearch terminating prematurely if it's being processed for too long. The subsearch would then silently fail and you'd get incomplete data.&lt;/P&gt;&lt;P&gt;But another thing is that you actually don't do it this way to have reliable results quickly.&lt;/P&gt;&lt;P&gt;I'd advise the reverse approach - calculate tstats over your indexes, then add "empty" results from your list of metadata and sum.&lt;/P&gt;&lt;PRE&gt;| tstats count by index sourcetype host &lt;BR /&gt;| append&lt;BR /&gt;&amp;nbsp; [ | inputlookup mylookuptable.csv&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | table index sourcetype host&lt;BR /&gt;&amp;nbsp;&amp;nbsp; | eval count=0 ]&lt;BR /&gt;| stats sum(count) as count by index sourcetype host&lt;BR /&gt;| where count=0&lt;/PRE&gt;</description>
      <pubDate>Sat, 23 Apr 2022 05:25:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/594988#M207048</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-04-23T05:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inputlookup search and join</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595104#M207093</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/238029"&gt;@davinder_kaur&lt;/a&gt;&amp;nbsp;- Try this query:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats max(_time) as last_event where index=* by index, sourcetype, host
| inputlookup missing_data.csv append=true 
| stats max(last_event) as last_event by environment, index, sourcetype, host
| eval current_time=now(), status = if(last_event &amp;lt; (current_time - 3600), "Missing", "Active")
| appendpipe 
    [| outputlookup missing_data.csv
    | where index="DON'T"]
| where status="Missing"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to schedule this every hour.&lt;/P&gt;&lt;P&gt;And that way this query will give you an alert if any data that was coming before suddenly stopped coming.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is wait duration would be 1 hour (3600 seconds) but you can change it if you want.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------&lt;BR /&gt;I hope this will be helpful. An upvote would be appreciated!!!&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 06:02:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595104#M207093</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2022-04-25T06:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inputlookup search and join</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595411#M207223</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/93915"&gt;@VatsalJagani&lt;/a&gt; &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry folks, I worked on it yesterday but didn't get time to reply to you. Unfortunately, it’s still not working for me.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 13:05:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595411#M207223</guid>
      <dc:creator>davinder_kaur</dc:creator>
      <dc:date>2022-04-26T13:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Inputlookup search and join</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595418#M207224</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/238029"&gt;@davinder_kaur&lt;/a&gt;&amp;nbsp;- Can you please give some details on what you mean when you say it's not working? Any errors or what is not working as you expect.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 13:39:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-search-not-displaying-results-for-those-values-only-if-any/m-p/595418#M207224</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2022-04-26T13:39:05Z</dc:date>
    </item>
  </channel>
</rss>

