Splunk Search

Lookup definition is outputting incomplete results

mbasharat
Builder

Hi,

I have a simple search which is using a lookup definition based off of a lookup. This lookup is large. Search has been using this lookup perfectly fine outputting correct results. Since upgrade to below version of Splunk Enterprise, this output is not happening like it used to. Matched output is significantly reduced resulting in NULL values for many fields even though lookup is complete and has no issues. I am wondering what has changed that is causing this in below version and how to remediate it?

Splunk Enterprise Version: 9.3.1
Build: 0b8d769cb912

index=A sourcetype=B
| stats count by XYZ
| lookup ABC XYZ as XYZ OUTPUT FieldA, FieldB
Labels (1)
Tags (1)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

Did your lookup grow in size during this time?  I had this problem with a large lookup a while ago.  Check out Why does lookup return null when there are multiple matches.

0 Karma

dural_yyz
Motivator

Not sure this is really an issue, but I would from practice keep the event and lookup field names a little different.  It could prevent any unintended complications in displaying or transforming data.

0 Karma

mbasharat
Builder

@dural_yyz yes, field names are kept different.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...