Splunk Dev

can't see all the event of an index anymore

splunkLPN
Path Finder

If I search | eventcount summarize=false index=index3 the answer is count : 32339388
If I search index=index3 182154 event events are count with empty days 42 days before the last days.

I've made 2 changes before to have this behavior :

  • upgrade to 7.1
  • go from a free license to a dev licence on my lab machine.

of course i'm on "all-time" period (or hope to be, because it's look like I'm not)

thank's for your help 🙂

Tags (2)
0 Karma
1 Solution

splunkLPN
Path Finder

OK I've found the limit : "Search auto-finalized after disk usage limit (0MB) reached. "

View solution in original post

0 Karma

splunkLPN
Path Finder

OK I've found the limit : "Search auto-finalized after disk usage limit (0MB) reached. "

0 Karma

p_gurav
Champion

Did you run both the query for all time?

0 Karma

splunkLPN
Path Finder

Thank's. Yes. I did it with the web interface. Is there a SPL command to include all time period ?

0 Karma

skoelpin
SplunkTrust
SplunkTrust
0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...