Splunk Search

Why is the drilldown in my search using three lookup tables not returning results?

mikaelbje
Motivator

I'm working on a dashboard that shows VPN logins and Citrix XenApp applications with inputs to select a specific business unit and facility name (actual location/complex).

The way I join a Citrix application with a facility and business unit is through three lookup tables:

props.conf:

[xenapp:65:session]
LOOKUP-table1 = business_units_facilities_applications application_name OUTPUTNEW facility_id
LOOKUP-table2 = business_units_facilities facility_id OUTPUTNEW facility_id facility_name bunit
LOOKUP-table3 = business_units bunit OUTPUTNEW bunit business_unit_name

FIELDALIAS-xenapp_fields = BrowserName AS application_name

transforms.conf:

[business_units]
filename = business_units.csv

[business_units_facilities]
filename = business_units_facilities.csv

[business_units_facilities_applications]
filename = business_units_facilities_applications.csv

So what's happening is that the xenapp:65:session contains a field called BrowserName, I alias this to application_name which is in the business_units_facilities_applications lookup. I get a new field facility_id which is used to look up facility_name and bunit in the second table.

The third table looks up the friendly business_unit_name based on bunit. It all works and every field is shown in the search, except when I start drilling down in my search on any of the fields from table2 or table3. Why is that? Here's an example:

Search

When drilling down:

Drilldown

I'm running Splunk 6.1.4. I've tried doing default_match=* and min_matches=1 on the lookup definitions too. Is my SQL-esque way of thinking no good for Splunk lookup tables? Would I need to use a database and DB Connect in order to do this?

Tags (3)
0 Karma
1 Solution

somesoni2
Revered Legend

You would be able to drilldown better from a dashboard, not from a search view. See this for drilldown related help.
http://docs.splunk.com/Documentation/Splunk/6.1.4/Viz/PanelreferenceforSimplifiedXML#Drilldown_eleme...

When setting up drilldown, you can use tokens like $row.<>$ to pass the values.

Also, could you validate if you can manually run below searches with results:

sourcetype=zenapp:*:session FarmName="*" BrowserName="*" NOT BroswerName="" user="*" ServerName="*" 
business_unit_name="         Energi"      

sourcetype=zenapp:*:session FarmName="*" BrowserName="*" NOT BroswerName="" user="*" ServerName="*" 
| search business_unit_name="         Energi" 

 #comment: use the actual value for field business_unit_name

View solution in original post

mikaelbje
Motivator

Not really looking to drill down in the traditional sense but rather be able to search on the business_unit_name field in the base search. The issue is that to get to that field I need to go through the other lookups. I would expect Splunk to get me to that field since it returns it on based on the automatic lookups in the general search. I might have to do some manual | lookup commands in the search and then the | search filter in the end but it's a bit counter-intuitive as I already have the automatic lookups defined. Let me try what you suggested which looks like a possible workaround. Could it simply be a bug?

0 Karma

somesoni2
Revered Legend

You would be able to drilldown better from a dashboard, not from a search view. See this for drilldown related help.
http://docs.splunk.com/Documentation/Splunk/6.1.4/Viz/PanelreferenceforSimplifiedXML#Drilldown_eleme...

When setting up drilldown, you can use tokens like $row.<>$ to pass the values.

Also, could you validate if you can manually run below searches with results:

sourcetype=zenapp:*:session FarmName="*" BrowserName="*" NOT BroswerName="" user="*" ServerName="*" 
business_unit_name="         Energi"      

sourcetype=zenapp:*:session FarmName="*" BrowserName="*" NOT BroswerName="" user="*" ServerName="*" 
| search business_unit_name="         Energi" 

 #comment: use the actual value for field business_unit_name

mikaelbje
Motivator

Your "filter search" command solved it. I believe this is suboptimal as it has to fetch all results and then filter them. Any official comment on this would be more than welcome 🙂

If anyone can convert your comment to an answer that would be great.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...