Splunk Search

Scheduled search shows no events, but later searching the same time frame shows that there were

PeterWalker8
New Member

There is a search that runs every 30 minutes and normally it runs okay. But in few instances seemingly at random the events shows up as 0.

index=eventlog (host="TP-Servers-*" OR host="TP-Hosts-*") splunk_server="splunkns0" sourcetype="event.log" | top limit=38 host | stats count as alive_hosts

We grab the time frame to be -30m to -10m at time of running the search. 

The system uses this to confirm connection towards the hosts and servers. Below shows that at one point it shows 0 events found. 

OccurrencesOccurrences

But when we run the search again of the same time frame. We find there were events (this time it should be around 8000 events). 

We've checked the python, schedule, and splunkd logs and found no errors. 

The times this occurs is not the same every time. Each time we search back there are results to be found. Has anyone else met this type of issue? Or has any other direction we can check? 

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...