Getting Data In

Issue with my search query

GattyBiggz
Loves-to-Learn

Greeting,

I am trying to identify users who have not had any activity in O365 for over 180 days, however my search is pulling old logs and listing users based on those old longs but when I got into events I can see logs from some of those users that are not over 180 days old. How do I fix this issue. 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

It's not clear what is your situation but as I understand it you're pulling some logs into Splunk. And while the source logs are supposed to cover longer timespan you're not able to list events older than 180 days. Is that so?

The two most typical issues might be that either your index has short retention period and older events are rolled to frozen or your user is limited to searching for only 180 days back.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...