<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unsual behavior with search events in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667126#M17772</link>
    <description>&lt;P&gt;We have recently upgraded to Splunk Enterprise &lt;STRONG&gt;9.0&lt;/STRONG&gt;. When I try to run a search query without adding the &lt;STRONG&gt;index&lt;/STRONG&gt; field into it, the event count are showing wrong. Also if I try to see the respective event logs, from Verbose mode they are weird and this is not usual format of logs.&lt;/P&gt;&lt;P&gt;In other case, if index is mentioned in the query, everything is working fine and asusual.&lt;/P&gt;&lt;P&gt;This issue occurs only when the search query have stats or chart commands to visualise the data. Below is the sample search query which I used&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host=abc sourcetype=xyz |stats count&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure whether it is a bug in Splunk 9.0 or any other issue from config side (like limitations in search head). Could anyone please help me on this.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2023 10:18:36 GMT</pubDate>
    <dc:creator>akarivaratharaj</dc:creator>
    <dc:date>2023-11-02T10:18:36Z</dc:date>
    <item>
      <title>Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667126#M17772</link>
      <description>&lt;P&gt;We have recently upgraded to Splunk Enterprise &lt;STRONG&gt;9.0&lt;/STRONG&gt;. When I try to run a search query without adding the &lt;STRONG&gt;index&lt;/STRONG&gt; field into it, the event count are showing wrong. Also if I try to see the respective event logs, from Verbose mode they are weird and this is not usual format of logs.&lt;/P&gt;&lt;P&gt;In other case, if index is mentioned in the query, everything is working fine and asusual.&lt;/P&gt;&lt;P&gt;This issue occurs only when the search query have stats or chart commands to visualise the data. Below is the sample search query which I used&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host=abc sourcetype=xyz |stats count&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure whether it is a bug in Splunk 9.0 or any other issue from config side (like limitations in search head). Could anyone please help me on this.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 10:18:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667126#M17772</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-02T10:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667129#M17773</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Usually you should always add index=xyz on your query to avoid this situation. This is the best practices!&lt;/P&gt;&lt;P&gt;The reason for that behaviour is that every role has attribute srchIndexesDefault which are used if you don't add index=xyz on your query.&lt;/P&gt;&lt;PRE&gt;srchIndexesDefault = &amp;lt;semicolon-separated list&amp;gt;
* A list of indexes to search when no index is specified.
* These indexes can be wild-carded ("*"), with the exception that "*" does not
  match internal indexes.
* To match internal indexes, start with an underscore ("_"). All internal indexes are
  represented by "_*".
* The wildcard character "*" is limited to match either all the non-internal
  indexes or all the internal indexes, but not both at once.
* No default.&lt;/PRE&gt;&lt;P&gt;As users usually have different roles they have different combination of srchIndexesDefault and for that reason the real searches gives you to different results.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Authorizeconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Authorizeconf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 10:21:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667129#M17773</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-11-02T10:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667140#M17776</link>
      <description>&lt;P&gt;With the same query, if I try to view the events from verbose mode, I get something like blank events. Please. refer the attached screenshot. But this was not occurring earlier. We used to see the respective log events for the host and sourcetype which are mentioned in the query (though index is not included.)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27918iB8D75465A826D0AE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 10:41:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667140#M17776</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-02T10:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667144#M17778</link>
      <description>&lt;P&gt;Which kind of environment you have (single node, distributed) and have all nodes updated to the same version Splunk + OS and are all nodes using same OS?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 10:50:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667144#M17778</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-11-02T10:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667159#M17783</link>
      <description>&lt;P&gt;We have distributed environment. The Splunk version is same. The OS version of indexer, search heads are same but for deployment server it is different.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 11:29:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667159#M17783</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-02T11:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667162#M17784</link>
      <description>Have you check that your OS is supported by splunk with your current Splunk version?</description>
      <pubDate>Thu, 02 Nov 2023 11:32:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667162#M17784</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-11-02T11:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667176#M17786</link>
      <description>&lt;P&gt;Yes I have cross verified and all of the OS versions are supported for the Splunk version 9.0, as mentioned -&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Workloads/Requirements#:~:text=Splunk%20Enterprise%20supports%20workload%20management,Ubuntu%2016.04%20LTS%20and%20higher" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 13:17:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667176#M17786</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-02T13:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667656#M17816</link>
      <description>&lt;P&gt;Could any help or suggest me on this? Why am I getting blank events in the verbose mode when I run the search query without index field?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 09:46:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667656#M17816</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-07T09:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unsual behavior with search events</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667660#M17817</link>
      <description>&lt;P&gt;If the search indexes are based on roles, then the search query should behave in same way with or without any commands (like statistical command, chart commands or any other functions).&lt;/P&gt;&lt;P&gt;In my case, I am getting the empty logs whenever I run any of the below queries&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host=abc sourcetype=xyz |stats count
(or)
host=abc sourcetype=xyz |timechart count&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;whereas, with the below query (without mentioning index) I am able to see the log events successfully.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host=abc sourcetype=xyz&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 10:10:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Unsual-behavior-with-search-events/m-p/667660#M17817</guid>
      <dc:creator>akarivaratharaj</dc:creator>
      <dc:date>2023-11-07T10:10:30Z</dc:date>
    </item>
  </channel>
</rss>

