Splunk Search

Summary index for rolling 30d count not working as expected

craigcook
New Member

I've just started using summary indexes - I have two searches that work as expected on querying data in just the previous day.

I also what a job that queries our unique users over the previous 30 days

Here is my summary query:

event=login 
| sistats dc(user_id)

In the UI for Time range I have: from: -30d@d to: @d

and this runs every day at midnight

What I think this does:

query the login events
count the distinct ids for the previous 30 days

store them in a summary index using sistats

My retrieval query is:

event=login 
| stats dc(user_id) by _time

What I expect this to do:

return the summarized 30 day distinct count day over day

What I get:
the summarized value for 30 days : SUCCESS!

the timestamp for the count is 30 days ago and not the date of the summary run

Can someone point me to what I am doing wrong? I don't understand why the timestamp is 30 days ago and not the date of the scheduled run

Tags (1)
0 Karma

craigcook
New Member

I found the following thread:

sistats vs stats

I will try this approach and see if it works better. Ultimately I was building two indexes one for daily and one for 30 days, but this link suggests to use the same index as data for both.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...