Splunk Dev

can't see all the event of an index anymore

splunkLPN
Path Finder

If I search | eventcount summarize=false index=index3 the answer is count : 32339388
If I search index=index3 182154 event events are count with empty days 42 days before the last days.

I've made 2 changes before to have this behavior :

  • upgrade to 7.1
  • go from a free license to a dev licence on my lab machine.

of course i'm on "all-time" period (or hope to be, because it's look like I'm not)

thank's for your help 🙂

Tags (2)
0 Karma
1 Solution

splunkLPN
Path Finder

OK I've found the limit : "Search auto-finalized after disk usage limit (0MB) reached. "

View solution in original post

0 Karma

splunkLPN
Path Finder

OK I've found the limit : "Search auto-finalized after disk usage limit (0MB) reached. "

0 Karma

p_gurav
Champion

Did you run both the query for all time?

0 Karma

splunkLPN
Path Finder

Thank's. Yes. I did it with the web interface. Is there a SPL command to include all time period ?

0 Karma

skoelpin
SplunkTrust
SplunkTrust
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...