The search they are running is
index=* cloudtrail<bucketnumber>*
across a 7 day period.
Environment Details: We are using the Splunk Add-on for AWS on a search head cluster, On-prem.
On review of the inspect job log, it looks like one user's search is reaching out to source=s3://<aws smart store info> and the other users search is only searching the local indexes. Resulting in a drastic event return difference of 76 results vs 8500 during the same time period.
Steps I've taken:
I checked the app they are searching in and roles for each user (they are identical)
I checked the user folder in Splunk, their settings are the same even down to the time zone.
Even tried adding the index name to the search and having the user with missing logs re-run it. Still no change in her results and the job logs are showing it is not reaching out to S3.
Is there something I am missing? Is this an AWS app setting that I need to adjust? I would appreciate any thought you may have on this. Thanks!