Splunk Search

stats count issue, mismatch with search query results

delalegro
Engager

Hello,

i'm using a query to find all traffic hitting a singe firewall rule.
it's something like this: host=fw_host_name rule_uid={uid} action=accept

i wanted to create a list of all sources, destinations and services(ports) with a count so i added | stats count by src dst service
The output i get is perfect for example the following row src:192.168.1.1 dst:8.8.8.8 service:22 count:71

but if i do the following search query over the same time: host=fw_host_name rule_uid={uid} action=accept src=192.168.1.1 dst=8.8.8.8 service=22 splunk returns 85 events.

so whats wrong with the stats count that it's not returning all events?

Thanks in advance for your help!

0 Karma

somesoni2
Revered Legend

How many events you get, for same time range, for this query

host=fw_host_name rule_uid={uid} action=accept src=192.168.1.1 dst=8.8.8.8 service=22  | stats count by src dst service

AND

 host=fw_host_name rule_uid={uid} action=accept src=* dst=* service=* | stats count by src dst service
0 Karma

renjith_nair
Legend

Its possible that you are getting live data and by the time you execute the second search , you have more events indexed.

Try your searches for a specific time period. for eg: datetime range

Happy Splunking!
0 Karma

delalegro
Engager

Thanks for your answer, sorry for being not clear. I used the same date time range for both queries.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...