Splunk Search

Why in my current search, fewer results appear?

splunkcol
Builder

Hello everyone,
A query, I have the following problem where a query is made to a specific index and sourcetype at a certain time and if the next day I execute that query again, the number of events is less. It is worth mentioning that it is not possible to see any corrupted buket, or that the space of the indexers is full, which could cause a loss of information.

Excuse the translation by google

Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Hard to say without actually seeing your search. The most obvious possible reason that comes to mind is that you indeed have fewer and fewer events in the specified timerange. Maybe some buckets expire. Maybe the inputs stopped working...

See the report in job inspector.

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...