Splunk Search

Lookup time-based not working with tstats

avasquez
Loves-to-Learn Lots

Hi,

I'm trying to configure a time-based lookup (temporal lookup) but it doesn't seem to be working as expected.

1) The lookup definitions fields are: time, context, tag::timebased

 

time,context,tag::timebased
2020-11-18,eft,high
2020-11-11,eft,high
2020-11-04,eft,high
2020-10-28,eft,high
2020-10-21,eft,high

 


2) The The transforms.conf is on the SH

 

[timebasedlookup]
time_field = time
time_format = %Y-%m-%d
min_matches = 1
max_matches = 10
default_match = default
min_offset_secs = 0
max_offset_secs = 86400
collection = timebasedlookup
external_type = kvstore
fields_list = _key, time, context, tag::timebased

 

 

3) When i run a search to index the results are OK ("high" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.45.png


4) But when i run search to datamodel (tstats) the results are NOK ("default" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.56.png

The same _time in index query and tstats query return different results.

Labels (2)
0 Karma

Tune In & Win!

Don't miss out on your
chance to take home free
prizes by helping our players
save the Splunk Cloudom!

Dungeons & Data
Monsters: Splunk O11y
Day Editions Games
stream live:
5/4 at 6:30pm PST
5/5 at 7:00pm PST
on