Splunk Search

Summary incorrect on search page

splunkranger
Path Finder

The 'Search' page, which lists the number of events, the oldest and latest event is not accurate.

Can anyone tell me where this information is being collected from?

Tags (1)
0 Karma

marcoscala
Builder

First of all, you will see events just from your 'default' indexes, depending on the User's role, as someoni2 said.

Then, if you have strange dates as newest or late see bent, this means that there's a time stamp problem: so if you see events in the future, check for events in that time range and check of time stamp in the event is translated. The same if you have events older than they are supposed to be. It's a quite common problem, if Imunderstood right your question.

Happy Splunking,
Marco

0 Karma

splunkranger
Path Finder

This jives.

Thank you!

0 Karma

somesoni2
Revered Legend

My bad, its indexes the users searches by default. Thanks @Martin for correction

martin_mueller
SplunkTrust
SplunkTrust

Does it use indexes the user has access to or indexes the user searches by default?

somesoni2
Revered Legend

Yes, the search shows stats from the indexes to which user has access to.

splunkranger
Path Finder

This looks correct when I run it, can the results be effected by a users security role?

somesoni2
Revered Legend

| metadata type=sourcetypes | search totalCount>0 | rename totalCount as Count | stats sum(Count) as "INDEXED" min(firstTime) as "EARLIEST EVENT" max(lastTime) as "LATEST EVENT"

Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...