Splunk Search

How to get a count difference when I add index=* to tstats?

fredclown
Builder

I'm logged into my system as an admin, so I have access to all the indexes. I've also verified this by looking at the admin role. It indeed has access to all the indexes. However, when I run the below two searches  I get different counts. I would think I should get the same count. The first one gives me a lower count. It's a pretty low volume dev system so the counts are low. They are different by about 20,000 events. I ran it with a time range of yesterday so that the counts wouldn't change. Does anyone have any thoughts on what could be causing this?

 

| tstats count ```the count was 95835```

 

vs

 

| tstats count where index IN (*) ```the counts was 115339```

 

Labels (2)
0 Karma
1 Solution

fredclown
Builder

Ok, I figured it out. It was a silly miss on my part. While my user had access to all the indexes only main was set as default, so leaving out the index only returned what went to main.

View solution in original post

0 Karma

fredclown
Builder

Ok, I figured it out. It was a silly miss on my part. While my user had access to all the indexes only main was set as default, so leaving out the index only returned what went to main.

0 Karma
Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...