Splunk Search

My automatic lookup field is not searchable unless I pipe search for it.


I am trying to run the following search in Splunk:

index=index1 sourcetype=sourcetype1 bldg=XI

The bldg field is an automatic lookup field and exists in 100% of the events for index=index1 & sourcetype=sourcetype1. However, when I run this search, I only get back less then 1% of the results I would expect.

When I run the search as follows, I get back all of the results I am looking for.

index=index1 sourcetype=sourcetype1 | search bldg=XI

Why do I need to pipe search to get the correct results?

I am using Splunk 6.0.2

Tags (3)
0 Karma


It sounds like you don't have a field extraction set up for bldg. The following documentation will explain why, a lot better than I can.


Default field extractions have to be common to every entry. By identifying the different sourcetype and index, is making the bldg field common to all entries. Then you're performing another search where your string would match.

I could be wrong, but I am going to guess there is an entry where bldg has a value with a space in it?

0 Karma


There must be an invisible space in my lookup table because when I run the search as follows, it works as expected:

index=index1 sourcetype=sourcetype1 bldg=XI*

0 Karma


That still doesn't answer though why it works without the * if I | search.

0 Karma
Get Updates on the Splunk Community!

Splunk APM & RUM | Upcoming Planned Maintenance

There will be planned maintenance of the streaming infrastructure for Splunk APM and Splunk RUM in the coming ...

Part 2: Diving Deeper With AIOps

Getting the Most Out of Event Correlation and Alert Storm Detection in Splunk IT Service Intelligence   Watch ...

User Groups | Upcoming Events!

If by chance you weren't already aware, the Splunk Community is host to numerous User Groups, organized ...