Splunk Search

Lookup time-based not working with tstats

avasquez
Loves-to-Learn Lots

Hi,

I'm trying to configure a time-based lookup (temporal lookup) but it doesn't seem to be working as expected.

1) The lookup definitions fields are: time, context, tag::timebased

 

time,context,tag::timebased
2020-11-18,eft,high
2020-11-11,eft,high
2020-11-04,eft,high
2020-10-28,eft,high
2020-10-21,eft,high

 


2) The The transforms.conf is on the SH

 

[timebasedlookup]
time_field = time
time_format = %Y-%m-%d
min_matches = 1
max_matches = 10
default_match = default
min_offset_secs = 0
max_offset_secs = 86400
collection = timebasedlookup
external_type = kvstore
fields_list = _key, time, context, tag::timebased

 

 

3) When i run a search to index the results are OK ("high" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.45.png


4) But when i run search to datamodel (tstats) the results are NOK ("default" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.56.png

The same _time in index query and tstats query return different results.

Labels (2)
0 Karma
Get Updates on the Splunk Community!

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...

Alerting Best Practices: How to Create Good Detectors

At their best, detectors and the alerts they trigger notify teams when applications aren’t performing as ...

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...