Splunk Search

Lookup time-based not working with tstats

avasquez
Loves-to-Learn Lots

Hi,

I'm trying to configure a time-based lookup (temporal lookup) but it doesn't seem to be working as expected.

1) The lookup definitions fields are: time, context, tag::timebased

 

time,context,tag::timebased
2020-11-18,eft,high
2020-11-11,eft,high
2020-11-04,eft,high
2020-10-28,eft,high
2020-10-21,eft,high

 


2) The The transforms.conf is on the SH

 

[timebasedlookup]
time_field = time
time_format = %Y-%m-%d
min_matches = 1
max_matches = 10
default_match = default
min_offset_secs = 0
max_offset_secs = 86400
collection = timebasedlookup
external_type = kvstore
fields_list = _key, time, context, tag::timebased

 

 

3) When i run a search to index the results are OK ("high" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.45.png


4) But when i run search to datamodel (tstats) the results are NOK ("default" in tag::timebased)

Captura de Pantalla 2020-12-03 a la(s) 11.17.56.png

The same _time in index query and tstats query return different results.

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Message Parsing in SOCK

Introduction This blog post is part of an ongoing series on SOCK enablement. In this blog post, I will write ...

Exploring the OpenTelemetry Collector’s Kubernetes annotation-based discovery

We’ve already explored a few topics around observability in a Kubernetes environment -- Common Failures in a ...

Use ‘em or lose ‘em | Splunk training units do expire

Whether it’s hummus, a ham sandwich, or a human, almost everything in this world has an expiration date. And, ...