Splunk Enterprise

Why is Splunk Cloud Lookup Outputting empty values?

paras
Explorer

I have a lookup that is mapping action, category, attributes and more fields for windows event codes. However for each event code not all the column have values. 

EventCode, action, category, attr, .....

1,allow,,xyx,,,

2,fail,firewall,,....

 

When I add this to the transforms and props.conf and deploy it out to splunk cloud it is creating fields even when it is empty for that match. 

Is there a way to make sure that the null values are not getting outputted using props and transforms.conf ?

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The settings look good to me.  Consider opening a support request.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Please share the props and transforms as well as the SPL you're using to access the lookup.

---
If this reply helps you, Karma would be appreciated.

paras
Explorer

In transforms.conf

[bv_windows_mapping]
filename =bv_windows_mapping.csv
max_matches = 1
min_matches = 1

 

In props.conf

LOOKUP-bv_windows_mapping =bv_windows_mapping EventCode OUTPUTNEW action, category, attr

 

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The settings look good to me.  Consider opening a support request.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...