Getting Data In

Issue with my search query

GattyBiggz
Loves-to-Learn

Greeting,

I am trying to identify users who have not had any activity in O365 for over 180 days, however my search is pulling old logs and listing users based on those old longs but when I got into events I can see logs from some of those users that are not over 180 days old. How do I fix this issue. 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

It's not clear what is your situation but as I understand it you're pulling some logs into Splunk. And while the source logs are supposed to cover longer timespan you're not able to list events older than 180 days. Is that so?

The two most typical issues might be that either your index has short retention period and older events are rolled to frozen or your user is limited to searching for only 180 days back.

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...