Splunk Search

Users with the same roles, in the same app, and same search, are getting different results from AWS logs

sperkins
Path Finder

The search they are running is

index=* cloudtrail<bucketnumber>*

across a 7 day period.

Environment Details: We are using the Splunk Add-on for AWS on a search head cluster, On-prem.

On review of the inspect job log, it looks like one user's search is reaching out to source=s3://<aws smart store info> and the other users search is only searching the local indexes. Resulting in a drastic event return difference of 76 results vs 8500 during the same time period.

Steps I've taken:
I checked the app they are searching in and roles for each user (they are identical)
I checked the user folder in Splunk, their settings are the same even down to the time zone. 
Even tried adding the index name to the search and having the user with missing logs re-run it. Still no change in her results and the job logs are showing it is not reaching out to S3. 

Is there something I am missing? Is this an AWS app setting that I need to adjust? I would appreciate any thought you may have on this. Thanks! 

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...