Splunk Search

Users with the same roles, in the same app, and same search, are getting different results from AWS logs

sperkins
Path Finder

The search they are running is

index=* cloudtrail<bucketnumber>*

across a 7 day period.

Environment Details: We are using the Splunk Add-on for AWS on a search head cluster, On-prem.

On review of the inspect job log, it looks like one user's search is reaching out to source=s3://<aws smart store info> and the other users search is only searching the local indexes. Resulting in a drastic event return difference of 76 results vs 8500 during the same time period.

Steps I've taken:
I checked the app they are searching in and roles for each user (they are identical)
I checked the user folder in Splunk, their settings are the same even down to the time zone. 
Even tried adding the index name to the search and having the user with missing logs re-run it. Still no change in her results and the job logs are showing it is not reaching out to S3. 

Is there something I am missing? Is this an AWS app setting that I need to adjust? I would appreciate any thought you may have on this. Thanks! 

Labels (1)
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...