Splunk Enterprise

Why is Splunk Cloud Lookup Outputting empty values?

paras
Explorer

I have a lookup that is mapping action, category, attributes and more fields for windows event codes. However for each event code not all the column have values. 

EventCode, action, category, attr, .....

1,allow,,xyx,,,

2,fail,firewall,,....

 

When I add this to the transforms and props.conf and deploy it out to splunk cloud it is creating fields even when it is empty for that match. 

Is there a way to make sure that the null values are not getting outputted using props and transforms.conf ?

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The settings look good to me.  Consider opening a support request.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Please share the props and transforms as well as the SPL you're using to access the lookup.

---
If this reply helps you, Karma would be appreciated.

paras
Explorer

In transforms.conf

[bv_windows_mapping]
filename =bv_windows_mapping.csv
max_matches = 1
min_matches = 1

 

In props.conf

LOOKUP-bv_windows_mapping =bv_windows_mapping EventCode OUTPUTNEW action, category, attr

 

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The settings look good to me.  Consider opening a support request.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...