<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event count mismatch when using using `field_name=&amp;quot;*&amp;quot;` and `field_name!=&amp;quot;&amp;quot;` in tstats query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418064#M120252</link>
    <description>&lt;P&gt;Thanks for the answer MuS.&lt;BR /&gt;
I have updated the question as per my research and found the problem in this scenario.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jul 2018 05:24:29 GMT</pubDate>
    <dc:creator>jshah24</dc:creator>
    <dc:date>2018-07-03T05:24:29Z</dc:date>
    <item>
      <title>Event count mismatch when using using `field_name="*"` and `field_name!=""` in tstats query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418061#M120249</link>
      <description>&lt;P&gt;Why is there a difference between the number of events scanned in both these queries?&lt;BR /&gt;
Using below query getting statistics count 25 and number of events (Events label below search query) as 214.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats values(XXXX.product_name) as "Product Name" from datamodel=XXXX where (XXXX.threat_name="*") by XXXX.threat_name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But, Using &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats values(XXXX.product_name) as "Product Name" from datamodel=XXXX where (XXXX.threat_name!="") by XXXX.threat_name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;getting statistics count same 25 and number of events (Events label below search query) as 5,468.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2018 14:03:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418061#M120249</guid>
      <dc:creator>jshah24</dc:creator>
      <dc:date>2018-07-02T14:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Event count mismatch when using using `field_name="*"` and `field_name!=""` in tstats query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418062#M120250</link>
      <description>&lt;P&gt;A few things to check here:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;you are using &lt;CODE&gt;summareisonly&lt;/CODE&gt; in the &lt;CODE&gt;tstats&lt;/CODE&gt; search, are the DMA searches running and summaries are available?&lt;/LI&gt;
&lt;LI&gt;compare apples with apples, use your base search from the data model with your &lt;CODE&gt;get-_index&lt;/CODE&gt; search&lt;/LI&gt;
&lt;LI&gt;talking of base search: does it return the expected results?&lt;/LI&gt;
&lt;LI&gt;Knowledge objects available to the DMA searches?&lt;/LI&gt;
&lt;LI&gt;permissions?&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Just a starting point, but good to check ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2018 21:07:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418062#M120250</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2018-07-02T21:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Event count mismatch when using using `field_name="*"` and `field_name!=""` in tstats query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418063#M120251</link>
      <description>&lt;P&gt;1) Are you running for a fixed time frame, such as &lt;CODE&gt;earliest=-1d@d latest=@d&lt;/CODE&gt;?&lt;/P&gt;

&lt;P&gt;2) Compare the output.  Which threat_name are the events missing from?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2018 22:05:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418063#M120251</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2018-07-02T22:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Event count mismatch when using using `field_name="*"` and `field_name!=""` in tstats query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418064#M120252</link>
      <description>&lt;P&gt;Thanks for the answer MuS.&lt;BR /&gt;
I have updated the question as per my research and found the problem in this scenario.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jul 2018 05:24:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418064#M120252</guid>
      <dc:creator>jshah24</dc:creator>
      <dc:date>2018-07-03T05:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: Event count mismatch when using using `field_name="*"` and `field_name!=""` in tstats query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418065#M120253</link>
      <description>&lt;P&gt;Thanks for your response DalJeanis.&lt;BR /&gt;
Yes, I am running queries for a fixed time frame.&lt;BR /&gt;
I have updated the question as per my research. please see the updated question. &lt;/P&gt;</description>
      <pubDate>Tue, 03 Jul 2018 05:26:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Event-count-mismatch-when-using-using-field-name-quot-quot-and/m-p/418065#M120253</guid>
      <dc:creator>jshah24</dc:creator>
      <dc:date>2018-07-03T05:26:51Z</dc:date>
    </item>
  </channel>
</rss>

