Splunk Search

How to get a count difference when I add index=* to tstats?

fredclown
Contributor

I'm logged into my system as an admin, so I have access to all the indexes. I've also verified this by looking at the admin role. It indeed has access to all the indexes. However, when I run the below two searches  I get different counts. I would think I should get the same count. The first one gives me a lower count. It's a pretty low volume dev system so the counts are low. They are different by about 20,000 events. I ran it with a time range of yesterday so that the counts wouldn't change. Does anyone have any thoughts on what could be causing this?

 

| tstats count ```the count was 95835```

 

vs

 

| tstats count where index IN (*) ```the counts was 115339```

 

Labels (2)
0 Karma
1 Solution

fredclown
Contributor

Ok, I figured it out. It was a silly miss on my part. While my user had access to all the indexes only main was set as default, so leaving out the index only returned what went to main.

View solution in original post

0 Karma

fredclown
Contributor

Ok, I figured it out. It was a silly miss on my part. While my user had access to all the indexes only main was set as default, so leaving out the index only returned what went to main.

0 Karma
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...