Splunk Search

Lookup definition is outputting incomplete results

mbasharat
Builder

Hi,

I have a simple search which is using a lookup definition based off of a lookup. This lookup is large. Search has been using this lookup perfectly fine outputting correct results. Since upgrade to below version of Splunk Enterprise, this output is not happening like it used to. Matched output is significantly reduced resulting in NULL values for many fields even though lookup is complete and has no issues. I am wondering what has changed that is causing this in below version and how to remediate it?

Splunk Enterprise Version: 9.3.1
Build: 0b8d769cb912

index=A sourcetype=B
| stats count by XYZ
| lookup ABC XYZ as XYZ OUTPUT FieldA, FieldB
Labels (1)
Tags (1)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

Did your lookup grow in size during this time?  I had this problem with a large lookup a while ago.  Check out Why does lookup return null when there are multiple matches.

0 Karma

dural_yyz
Motivator

Not sure this is really an issue, but I would from practice keep the event and lookup field names a little different.  It could prevent any unintended complications in displaying or transforming data.

0 Karma

mbasharat
Builder

@dural_yyz yes, field names are kept different.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...