Splunk Search

empty fields in a table

Explorer

why does Splunk display empty fields in the table even though there are values there

alt text

0 Karma
1 Solution

SplunkTrust
SplunkTrust

Cells in a table tend to be empty because either 1) the field has no value in the event; or 2) the event has no field by that name.
Run the search in Verbose Mode then look in the Events tab to see if the fields are indeed present and have values. Pay close attention to the spelling and capitalization of field names as Splunk cares about both. "status" is not the same as "Status", for example.

Pro tip: Add a default clause to your case functions to catch unexpected values. Something like eval description = case(status==200, "OK", ..., 1==1, "unknown").

---
If this reply helps you, an upvote would be appreciated.

View solution in original post

SplunkTrust
SplunkTrust

Cells in a table tend to be empty because either 1) the field has no value in the event; or 2) the event has no field by that name.
Run the search in Verbose Mode then look in the Events tab to see if the fields are indeed present and have values. Pay close attention to the spelling and capitalization of field names as Splunk cares about both. "status" is not the same as "Status", for example.

Pro tip: Add a default clause to your case functions to catch unexpected values. Something like eval description = case(status==200, "OK", ..., 1==1, "unknown").

---
If this reply helps you, an upvote would be appreciated.

View solution in original post

Explorer

Yes, you're right about mode. I tried Verbose mode, and it works as expected. Thank you

0 Karma

Explorer

But I face another issue: I have following a splunk query

source="maillog.log" host="mail_server" sourcetype="mail" | rex "(?\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})"

When I use top command

source="maillog.log" host="mail_server" sourcetype="mail" | rex "(?\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})" | top ip

it shows well. But when using table command it shows again field with null.

source="maillog.log" host="mail_server" sourcetype="mail" | rex "(?\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})" | table _time ip

I use Verbose mode and there are values in ip field.

0 Karma
State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!