Splunk Search

How do I run my search to find missing events on 80 Windows Domain Controllers running Splunk 6.1.4?

daniel_knights
New Member

We have Splunk running on all of our Windows Domain Controller servers (80 of them), but we seem to be missing events:

To try and find the missing events I run the below search:

host=server1* source="WinEventLog:Security" | sort 10000000 RecordNumber |delta RecordNumber as ID_diff |search ID_diff>1 |table _time RecordNumber ID_diff

While this search works, it must run per server and with 80 servers to run on, this can take a long time to do.

Is there a way to run this search on all of my servers at once and not have it interfere with other results?

We are running Splunk 6.1.4
Thanks

0 Karma

jeffland
SplunkTrust
SplunkTrust

Did you know you can acclerate reports? That might be an easy fix for your problem. But you should also consider the time your search covers. If it's a long span, then you might want to have a look at summary indexing.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...