Splunk Search

Why in my current search, fewer results appear?

splunkcol
Builder

Hello everyone,
A query, I have the following problem where a query is made to a specific index and sourcetype at a certain time and if the next day I execute that query again, the number of events is less. It is worth mentioning that it is not possible to see any corrupted buket, or that the space of the indexers is full, which could cause a loss of information.

Excuse the translation by google

Labels (1)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Hard to say without actually seeing your search. The most obvious possible reason that comes to mind is that you indeed have fewer and fewer events in the specified timerange. Maybe some buckets expire. Maybe the inputs stopped working...

See the report in job inspector.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...