Splunk Search

Contradiction of search result ?

sunrise
Contributor

I found the search contradiction between "index=* host=splkc" and "host=splkc".
Though the former search find some results, the later is not.
Why ?
alt text

alt text

Following environment.
Splunk version : 5.02
Operating System : Windows Server 2008 R2 64bit
Data : WMI Polling Data

Tags (1)
0 Karma
1 Solution

sideview
SplunkTrust
SplunkTrust

If there is no index term in your search, then Splunk will search the indexes that are listed as the default indexes for your role. You can see this list by going to Manager > Authentication > Roles.

Since by default users just have index="main" in that list, then what's happening in the first screenshot is it's only searching index="main", and there are no events from that host there.

In the second screenshot you've searched for index="*". this tells splunkd that you'd like to search all of the indexes that you have permission to search, and in an index called "wmi_performancelog", there are some events from that host.

It's a little confusing that the absence of an index term is actually a more restrictive search than index=*, but that's what's happening here.

View solution in original post

sideview
SplunkTrust
SplunkTrust

If there is no index term in your search, then Splunk will search the indexes that are listed as the default indexes for your role. You can see this list by going to Manager > Authentication > Roles.

Since by default users just have index="main" in that list, then what's happening in the first screenshot is it's only searching index="main", and there are no events from that host there.

In the second screenshot you've searched for index="*". this tells splunkd that you'd like to search all of the indexes that you have permission to search, and in an index called "wmi_performancelog", there are some events from that host.

It's a little confusing that the absence of an index term is actually a more restrictive search than index=*, but that's what's happening here.

sunrise
Contributor

Thank you sideview for quick response and explanation.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...