<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Different search results in search and dashboard in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741285#M240574</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253209"&gt;@NoSpaces&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Ensure that both searches (dashboard and manual) are using the same time range.&lt;/LI&gt;&lt;LI&gt;Check the time picker settings in the dashboard. The default time range in a dashboard might be different from the one you used in the search bar.&lt;/LI&gt;&lt;LI&gt;If you have multiple panels, ensure that they are all using the same base search. Sometimes, panels might be referencing different searches, leading to inconsistencies&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Mon, 10 Mar 2025 09:35:07 GMT</pubDate>
    <dc:creator>kiran_panchavat</dc:creator>
    <dc:date>2025-03-10T09:35:07Z</dc:date>
    <item>
      <title>Different search results in search and dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741278#M240571</link>
      <description>&lt;P&gt;Hello everyone!&lt;BR /&gt;I came across a strange behavior.&lt;BR /&gt;I was building a dashboard and noticed that some results look unexpected.&lt;BR /&gt;The results are presented at the top of the screenshot.&lt;BR /&gt;On the last row, you can see that ProvDuration is 0.&lt;BR /&gt;Also, StartTime and EndTime are equal.&lt;BR /&gt;Moreover, other fields are also equal, and it's illogical due to the search specifics.&lt;BR /&gt;As you can see, StartTime and EndTime represent the min and max values of the _time field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="hrz" (sourcetype="hrz_file_log" AND "*is provisioning") OR (sourcetype="hrz_file_syslog" AND EventType="AGENT_STARTUP")
| rex field=_raw "VM\s+(?&amp;lt;MachineName&amp;gt;.*)$"
| table _time, PoolId, MachineName, _raw
| transaction MachineName startswith="Pool" endswith="startup" maxevents=2 keeporphans=false
| search (PoolId="*") (MachineName="*")
| search duration&amp;lt;=700
| stats min(duration) AS DurationMin, avg(duration) AS DurationAvg, max(duration) AS DurationMax, min(_time) AS StartTime, max(_time) AS EndTime BY PoolId
| eval DurationMin = round(DurationMin, 2)
| eval DurationAvg = round(DurationAvg, 2)
| eval DurationMax = round(DurationMax, 2)
| eval ProvDuration = round((EndTime - StartTime), 2)
| eval StartTime = strftime(StartTime, "%Y-%m-%d %H:%M:%S.%3Q")
| eval EndTime = strftime(EndTime, "%Y-%m-%d %H:%M:%S.%3Q")
| table PoolId, DurationMin, DurationAvg, DurationMax, ProvDuration, StartTime EndTime&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I decided to dig deeper and try to analyze the search more carefully.&lt;BR /&gt;After I moved to the search through the dashboard, I found that the search results look different.&lt;BR /&gt;The last row looks as it should be.&lt;BR /&gt;You can see these results at the bottom of the screenshot.&lt;BR /&gt;What could be wrong with my search, and what am I missing?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 09:14:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741278#M240571</guid>
      <dc:creator>NoSpaces</dc:creator>
      <dc:date>2025-03-10T09:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Different search results in search and dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741285#M240574</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253209"&gt;@NoSpaces&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Ensure that both searches (dashboard and manual) are using the same time range.&lt;/LI&gt;&lt;LI&gt;Check the time picker settings in the dashboard. The default time range in a dashboard might be different from the one you used in the search bar.&lt;/LI&gt;&lt;LI&gt;If you have multiple panels, ensure that they are all using the same base search. Sometimes, panels might be referencing different searches, leading to inconsistencies&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 10 Mar 2025 09:35:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741285#M240574</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-10T09:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Different search results in search and dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741310#M240583</link>
      <description>&lt;P&gt;The transaction command is returning "transactions" with only one event. Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="hrz" (sourcetype="hrz_file_log" AND "*is provisioning") OR (sourcetype="hrz_file_syslog" AND EventType="AGENT_STARTUP")
| rex field=_raw "VM\s+(?&amp;lt;MachineName&amp;gt;.*)$"
| table _time, PoolId, MachineName, _raw
| transaction MachineName startswith="Pool" endswith="startup" maxevents=2 keeporphans=false
| where eventcount &amp;gt; 1
| search (PoolId="*") (MachineName="*")
| search duration&amp;lt;=700
| stats min(duration) AS DurationMin, avg(duration) AS DurationAvg, max(duration) AS DurationMax, min(_time) AS StartTime, max(_time) AS EndTime BY PoolId
| eval DurationMin = round(DurationMin, 2)
| eval DurationAvg = round(DurationAvg, 2)
| eval DurationMax = round(DurationMax, 2)
| eval ProvDuration = round((EndTime - StartTime), 2)
| eval StartTime = strftime(StartTime, "%Y-%m-%d %H:%M:%S.%3Q")
| eval EndTime = strftime(EndTime, "%Y-%m-%d %H:%M:%S.%3Q")
| table PoolId, DurationMin, DurationAvg, DurationMax, ProvDuration, StartTime EndTime&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 10 Mar 2025 11:26:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741310#M240583</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-03-10T11:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Different search results in search and dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741312#M240584</link>
      <description>&lt;P class="lia-align-left"&gt;UPD:&lt;BR /&gt;I found the solution&lt;BR /&gt;On the dashboard, I used a base search&lt;BR /&gt;&lt;EM&gt;It seems that the "table" command cuts something important for the transaction command&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="hrz" (sourcetype="hrz_file_log" AND "*is provisioning") OR (sourcetype="hrz_file_syslog" AND EventType="AGENT_STARTUP")
| table _time, PoolId, MachineName, _raw
| rex field=_raw "VM\s+(?&amp;lt;MachineName&amp;gt;.*)$"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;After a dozen manual attempts, I found that results can vary without changing the time span&lt;BR /&gt;Then I narrowed down the search to only one machine name to analyze the transaction behavior&lt;BR /&gt;Eventually, I observed that the transaction remains open even if start and end events exist&lt;BR /&gt;Then I replaced table with fields, and the transaction started to work as expected&lt;BR /&gt;All in all, the working variant is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="hrz" (sourcetype="hrz_file_log" AND "*is provisioning") OR (sourcetype="hrz_file_syslog" AND EventType="AGENT_STARTUP")
| table _time, PoolId, MachineName, _raw
| rex field=_raw "VM\s+(?&amp;lt;MachineName&amp;gt;.*)$"
&amp;lt;..&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If someone understands why transaction behavior is changing because of the table command, please supplement my answer&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 11:43:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Different-search-results-in-search-and-dashboard/m-p/741312#M240584</guid>
      <dc:creator>NoSpaces</dc:creator>
      <dc:date>2025-03-10T11:43:18Z</dc:date>
    </item>
  </channel>
</rss>

