<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tstats returns a count of zero when using an OR clause in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695498#M236492</link>
    <description>&lt;P&gt;First, OR operator is certainly usable in tstats. &amp;nbsp;Try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count values(sourcetype) values(source) where index = _introspection (sourcetype = kvstore
OR source="/Applications/Splunk/var/log/introspection/disk_objects.log")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my laptop, &amp;nbsp;this gives&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;count&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;values(sourcetype)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;values(source)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;3059&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;kvstore&lt;/DIV&gt;&lt;DIV class=""&gt;splunk_disk_objects&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/disk_objects.log&lt;/DIV&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/kvstore.log&lt;/DIV&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/kvstore.log.1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;So, the problem is elsewhere. &amp;nbsp;To troubleshoot, you need to examine data very closely. &amp;nbsp;For example,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count values(serviceType) where index="my_index" eventOrigin="api" 
(accountId="8674756857")&lt;/LI-CODE&gt;&lt;LI-CODE lang="markup"&gt;|tstats count values(accountId) where index="my_index" eventOrigin="api" 
(serviceType="unmanaged")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and so on. &amp;nbsp;Also explore your index search output. &amp;nbsp;Without seeing actual data, it is very difficult to perform haircut on the phone line, but there doesn't appear to be a bug in this aspect.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2024 05:49:18 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2024-08-07T05:49:18Z</dc:date>
    <item>
      <title>tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695330#M236447</link>
      <description>&lt;P&gt;For some reason my &lt;FONT face="andale mono,times"&gt;|tstats count&lt;/FONT&gt;&amp;nbsp;query is returning a result of 0 when I add an &lt;FONT face="andale mono,times"&gt;OR&lt;/FONT&gt; condition in my &lt;FONT face="andale mono,times"&gt;where&lt;/FONT&gt; clause if the field doesn't exist in the dataset, or if the&amp;nbsp;&lt;FONT face="andale mono,times"&gt;OR&lt;/FONT&gt; condition specifies a string value when the value for the field in the data is always an integer.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For example:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This query returns the correct event count (or at least it's non-zero):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index="my_index" eventOrigin="api" 
(accountId="8674756857")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding this OR condition returns a count of zero -- why? Note that for this time range there are no events with a &lt;FONT face="andale mono,times"&gt;serviceType&lt;/FONT&gt; field, but for other time ranges there are events with a &lt;FONT face="andale mono,times"&gt;serviceType&lt;/FONT&gt; field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index="my_index" eventOrigin="api" 
(accountId="8674756857" OR serviceType="unmanaged")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding this OR condition also returns zero -- why? It's true that&amp;nbsp;&lt;FONT face="andale mono,times"&gt;accountId&lt;/FONT&gt; should normally be an integer, but it's an OR, so I still expect it to count those events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index="my_index" eventOrigin="api" 
(accountId="19783038942" OR accountId="aaa")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using a &lt;FONT face="andale mono,times"&gt;*&lt;/FONT&gt; results in the same non-zero count as the first query, which is expected, even though there are no events with a&amp;nbsp;serviceType field:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index="my_index" eventOrigin="api" 
(accountId="8674756857" OR serviceType="unmana*")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why would adding an OR condition in &lt;FONT face="andale mono,times"&gt;tstats&lt;/FONT&gt; cause the count to be zero? The same problem does not occur with a regular &lt;FONT face="andale mono,times"&gt;search&lt;/FONT&gt; query.&lt;/P&gt;&lt;P&gt;I am on Splunk&amp;nbsp;9.1.0.2.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 19:15:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695330#M236447</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-08-05T19:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695353#M236451</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270830"&gt;@chrislkt&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;| tstats&amp;nbsp;&lt;/STRONG&gt;only searches the indexed fields in tsidx files. All fields searched with tstats must exist in the tsidx files. Most likely the field from one of the sides of your OR condition cannot be found within the time range specified, so tstats can't evaluate the OR condition properly because of the non-existent field, leading to 0 results.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get around this, you can just append another tstats command to replace the other side of the OR condition, e.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| tstats count where index="my_index" eventOrigin="api" accountId="8674756857"
| append 
  [| tstats count where index="my_index" eventOrigin="api" serviceType="unmanaged"]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 12:26:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695353#M236451</guid>
      <dc:creator>KendallW</dc:creator>
      <dc:date>2024-08-06T12:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause...</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695370#M236471</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/238768"&gt;@ciphercloudops&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tstats command works only with indexed fields. Default indexed fields for indexes are "host, source and sourcetype fields are indexed fields. Adding some fields as indexed is possible if you regularly need faster searches based on those fields. &amp;nbsp;But this addition needs to be done while indexing.&lt;/P&gt;&lt;P&gt;According to your tests, it seems the accountId and &lt;SPAN&gt;eventOrigin&amp;nbsp;&lt;/SPAN&gt;fields are indexed fields, which is why you can use them&amp;nbsp;&lt;SPAN&gt;in tstats query with no problems.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There is an option for querying fields unindexed fields if your raw data is suitable. If your serviceType field value is like serviceType=unmanaged (without spaces or quotes/double quotes) you can try below;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index="my_index" eventOrigin="api" ( accountId="8674756857" OR TERM(serviceType=unmana*) )&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 04:51:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695370#M236471</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2024-08-06T04:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause...</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695463#M236482</link>
      <description>&lt;P&gt;Thanks for your response&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;. We are using a custom sourcetype for our events which is configured in inputs.conf and props.conf to extract the fields from the events as JSON, so based on my reading of this documentation I think all the fields from the JSON are getting indexed, including serviceType:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.3.0/Data/Extractfieldsfromfileswithstructureddata#Use_configuration_files_to_enable_automatic_header-based_field_extraction" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.3.0/Data/Extractfieldsfromfileswithstructureddata#Use_configuration_files_to_enable_automatic_header-based_field_extraction&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We are able to use tstats to query on any of our JSON fields that I've tried, for example returns the correct non-zero count:&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" serviceType="unmanaged"&lt;/PRE&gt;&lt;P&gt;I tried your tip about using TERM(), but I don't think it applies here. As I mentioned, I can use a wildcard on the serviceType value even without TERM() and it works as expected, even when there are no events containing serviceType:&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857" OR serviceType="unmana*")&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 20:57:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695463#M236482</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-08-06T20:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695467#M236484</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/121137"&gt;@KendallW&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using automatic header-based field extraction for our JSON documents as described here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.3.0/Data/Extractfieldsfromfileswithstructureddata#Use_configuration_files_to_enable_automatic_header-based_field_extraction" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.3.0/Data/Extractfieldsfromfileswithstructureddata#Use_configuration_files_to_enable_automatic_header-based_field_extraction&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So when fields like serviceType are present in the events I believe they are getting indexed.&lt;/P&gt;&lt;P&gt;You are correct that serviceType is completely missing from the events for time ranges where my tstats query returns 0, but I don't understand why it would work this way, especially since adding a wildcard to &lt;U&gt;either&lt;/U&gt; OR value returns the correct non-zero result:&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857&lt;FONT color="#FF0000"&gt;*&lt;/FONT&gt;" OR serviceType="unmanaged")&lt;/PRE&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857" OR serviceType="unmanaged&lt;FONT color="#FF0000"&gt;*&lt;/FONT&gt;")&lt;/PRE&gt;&lt;P&gt;This really seems like a bug.&lt;/P&gt;&lt;P&gt;Thanks for the tip about &lt;STRONG&gt;|append&lt;/STRONG&gt;, though this is very undesirable and possibly infeasible for us considering the complexity of our queries and how many we have.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 21:16:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695467#M236484</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-08-06T21:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695498#M236492</link>
      <description>&lt;P&gt;First, OR operator is certainly usable in tstats. &amp;nbsp;Try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count values(sourcetype) values(source) where index = _introspection (sourcetype = kvstore
OR source="/Applications/Splunk/var/log/introspection/disk_objects.log")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my laptop, &amp;nbsp;this gives&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;count&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;values(sourcetype)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;values(source)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;3059&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;kvstore&lt;/DIV&gt;&lt;DIV class=""&gt;splunk_disk_objects&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/disk_objects.log&lt;/DIV&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/kvstore.log&lt;/DIV&gt;&lt;DIV class=""&gt;/Applications/Splunk/var/log/introspection/kvstore.log.1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;So, the problem is elsewhere. &amp;nbsp;To troubleshoot, you need to examine data very closely. &amp;nbsp;For example,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count values(serviceType) where index="my_index" eventOrigin="api" 
(accountId="8674756857")&lt;/LI-CODE&gt;&lt;LI-CODE lang="markup"&gt;|tstats count values(accountId) where index="my_index" eventOrigin="api" 
(serviceType="unmanaged")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and so on. &amp;nbsp;Also explore your index search output. &amp;nbsp;Without seeing actual data, it is very difficult to perform haircut on the phone line, but there doesn't appear to be a bug in this aspect.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 05:49:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695498#M236492</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-08-07T05:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695554#M236507</link>
      <description>&lt;P&gt;There some limits how many fields and how many characters events can be to get automatic indexing extraction to work. I cannot recall the length, but those are not so big than someone can expect. Probably those was defined on limits.conf or some other conf file.&lt;BR /&gt;If I recall right you can also find some discussions on answers about this issue?&lt;/P&gt;&lt;P&gt;Also this conf presentation can help you with unindexed fields.&amp;nbsp;&lt;A href="https://conf.splunk.com/files/2023/slides/PLA1258C.pdf" target="_blank"&gt;https://conf.splunk.com/files/2023/slides/PLA1258C.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 13:25:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695554#M236507</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2024-08-07T13:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695844#M236557</link>
      <description>&lt;P&gt;I can't find any evidence that this is a simple data issue. We have many customers using queries like this, and it was only noticed a couple weeks ago. One guess is that the behavior changed when we upgraded from Splunk 8.x to 9.x a couple months ago.&lt;/P&gt;&lt;P&gt;To further illustrate:&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857")&lt;/PRE&gt;&lt;P&gt;Result: 6618&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857" OR serviceType="unmanaged")&lt;/PRE&gt;&lt;P&gt;Result: 0&lt;/P&gt;&lt;PRE&gt;|tstats count where index="my_index" eventOrigin="api" &lt;BR /&gt;(accountId="8674756857" OR serviceType="unmanaged" OR noSuchField="noSuchValue*")&lt;/PRE&gt;&lt;P&gt;Result:&amp;nbsp;6618&lt;/P&gt;&lt;P&gt;So adding a bogus OR term with an asterisk in the value returns the correct result, but without it the result is 0. I can't imagine this is correct behavior, and we have submitted a support request to Splunk.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 14:40:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695844#M236557</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-08-09T14:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695845#M236558</link>
      <description>&lt;P&gt;Thanks for the idea about the limits. I checked them and it doesn't look like the cause in this case, though we have run into that before where events with too much data didn't get indexed.&lt;/P&gt;&lt;P&gt;Also, that looks like a very useful presentation.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 14:45:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695845#M236558</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-08-09T14:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695862#M236560</link>
      <description>&lt;P&gt;My laptop runs Splunk 9.2.2. &amp;nbsp;So the version is not causing a problem.&lt;/P&gt;&lt;P&gt;As to asterisk in field name, this has come up in previous discussions several times. &amp;nbsp;Each time, it turns out that the name of the field contains some invisible characters like trailing white space. &amp;nbsp;You mentioned your raw events are JSON. &amp;nbsp;That makes this type of problem less likely. &amp;nbsp;But still, check the original JSON documents as well as ingested JSON events. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 16:46:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695862#M236560</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-08-09T16:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695903#M236566</link>
      <description>&lt;P&gt;If all else fails, it's always useful to check job log and see the lispy search. Might not solve the problem but can give valuable insight.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Aug 2024 19:39:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/695903#M236566</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-08-10T19:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: tstats returns a count of zero when using an OR clause</title>
      <link>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/698720#M237242</link>
      <description>&lt;P&gt;Splunk support confirmed this is a bug in 9.1.0.2. Based on the SPL, it has been resolved in Beryllium 9.1.4 and Cobalt 9.2.1.&lt;/P&gt;&lt;P&gt;As a workaround until we upgrade, I have appended a bogus OR condition with a wildcard, e.g.:&lt;/P&gt;&lt;PRE&gt; OR noSuchField=noSuchValue* &lt;/PRE&gt;&lt;P&gt;to the other OR conditions in our WHERE clauses, and this causes Splunk to return the correct result.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 00:04:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/tstats-returns-a-count-of-zero-when-using-an-OR-clause/m-p/698720#M237242</guid>
      <dc:creator>chrislkt</dc:creator>
      <dc:date>2024-09-11T00:04:57Z</dc:date>
    </item>
  </channel>
</rss>

