Splunk Search

Summary incorrect on search page

splunkranger
Path Finder

The 'Search' page, which lists the number of events, the oldest and latest event is not accurate.

Can anyone tell me where this information is being collected from?

Tags (1)
0 Karma

marcoscala
Builder

First of all, you will see events just from your 'default' indexes, depending on the User's role, as someoni2 said.

Then, if you have strange dates as newest or late see bent, this means that there's a time stamp problem: so if you see events in the future, check for events in that time range and check of time stamp in the event is translated. The same if you have events older than they are supposed to be. It's a quite common problem, if Imunderstood right your question.

Happy Splunking,
Marco

0 Karma

splunkranger
Path Finder

This jives.

Thank you!

0 Karma

somesoni2
Revered Legend

My bad, its indexes the users searches by default. Thanks @Martin for correction

martin_mueller
SplunkTrust
SplunkTrust

Does it use indexes the user has access to or indexes the user searches by default?

somesoni2
Revered Legend

Yes, the search shows stats from the indexes to which user has access to.

splunkranger
Path Finder

This looks correct when I run it, can the results be effected by a users security role?

somesoni2
Revered Legend

| metadata type=sourcetypes | search totalCount>0 | rename totalCount as Count | stats sum(Count) as "INDEXED" min(firstTime) as "EARLIEST EVENT" max(lastTime) as "LATEST EVENT"

Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...