I'm doing a simple query into splunk to retrieve some data:
index=my_index
|table source,host
I've also put a specific timestamp using the "date & time range" tab, the query return around 19K events/lines.
The issue is that the query 'miss' some data (around 300 events/lines in total), data that appears when I'm lowering the time range or when I'm being more specific in the filtering of my query as such:
index= my_index host=a_specific_host
|table source,host
Then the previously missing data are shown. One thing to notice is that the missing data aren't random, there are always the same.
Do you have any idea on what could cause the issue ?
I'm running Splunk Enterprise Version: 7.2.3
Regards
Does it always work if you do not use | table source host?
I would definitely open a support case.
I did that too
Be sure to post back what you find.