Splunk Search

Summary incorrect on search page

splunkranger
Path Finder

The 'Search' page, which lists the number of events, the oldest and latest event is not accurate.

Can anyone tell me where this information is being collected from?

Tags (1)
0 Karma

marcoscala
Builder

First of all, you will see events just from your 'default' indexes, depending on the User's role, as someoni2 said.

Then, if you have strange dates as newest or late see bent, this means that there's a time stamp problem: so if you see events in the future, check for events in that time range and check of time stamp in the event is translated. The same if you have events older than they are supposed to be. It's a quite common problem, if Imunderstood right your question.

Happy Splunking,
Marco

0 Karma

splunkranger
Path Finder

This jives.

Thank you!

0 Karma

somesoni2
Revered Legend

My bad, its indexes the users searches by default. Thanks @Martin for correction

martin_mueller
SplunkTrust
SplunkTrust

Does it use indexes the user has access to or indexes the user searches by default?

somesoni2
Revered Legend

Yes, the search shows stats from the indexes to which user has access to.

splunkranger
Path Finder

This looks correct when I run it, can the results be effected by a users security role?

somesoni2
Revered Legend

| metadata type=sourcetypes | search totalCount>0 | rename totalCount as Count | stats sum(Count) as "INDEXED" min(firstTime) as "EARLIEST EVENT" max(lastTime) as "LATEST EVENT"

Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...