Splunk Search

How to set default for search time picker in Splunk Cloud

edgarrity
Path Finder
Does anyone know how to change the default time for ad-hoc searches from 30 minutes to 7 days in Splunk Cloud? I changed the setting in Server settings » Search preferences to 7 days. However, the default in Search & Reporting is still 30 minutes. Our data usually takes 48 hours to get though the data pipeline, so a 30 minute time window for searches will never return data.
Labels (1)
0 Karma
Get Updates on the Splunk Community!

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

SignalFlow: What? Why? How?

What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth ...

Federated Search for Amazon S3 | Key Use Cases to Streamline Compliance Workflows

Modern business operations are supported by data compliance. As regulations evolve, organizations must ...