Splunk Search

Summary incorrect on search page

splunkranger
Path Finder

The 'Search' page, which lists the number of events, the oldest and latest event is not accurate.

Can anyone tell me where this information is being collected from?

Tags (1)
0 Karma

marcoscala
Builder

First of all, you will see events just from your 'default' indexes, depending on the User's role, as someoni2 said.

Then, if you have strange dates as newest or late see bent, this means that there's a time stamp problem: so if you see events in the future, check for events in that time range and check of time stamp in the event is translated. The same if you have events older than they are supposed to be. It's a quite common problem, if Imunderstood right your question.

Happy Splunking,
Marco

0 Karma

splunkranger
Path Finder

This jives.

Thank you!

0 Karma

somesoni2
Revered Legend

My bad, its indexes the users searches by default. Thanks @Martin for correction

martin_mueller
SplunkTrust
SplunkTrust

Does it use indexes the user has access to or indexes the user searches by default?

somesoni2
Revered Legend

Yes, the search shows stats from the indexes to which user has access to.

splunkranger
Path Finder

This looks correct when I run it, can the results be effected by a users security role?

somesoni2
Revered Legend

| metadata type=sourcetypes | search totalCount>0 | rename totalCount as Count | stats sum(Count) as "INDEXED" min(firstTime) as "EARLIEST EVENT" max(lastTime) as "LATEST EVENT"

Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...