Hi All, Can you please help me with my problem? I would like to check all the hosts in the CSV file which are for some reason truncated due to too many records. I have modified the search which was provided on the other posts by some good soul 🙂 Here is my search: | inputlookup my_lookup_definition | join type=left [metadata type=hosts] |dedup host lastTime firstTime | eval age = now()-lastTime | convert ctime(lastTime) | eval field_in_ddhhmmss=tostring((age) , "duration") |rename field_in_ddhhmmss as "Time Offline" lastTime as "Last Time" | sort + "lastTime" | table host "Time Offline" "Last Time" My main goal is to search all hosts from the CSV file, check which one of them have been reporting to Splunk and which ones have stopped. The above search would do the trick, but the logs are truncated 😞 Is there any other way to achieve my goal without modifying the config files? [subsearch]: Subsearch produced 100000 results, truncating to maxout 50000.
[subsearch]: Metadata results may be incomplete: 100000 entries have been received from all peers (see parameter maxcount under the [metadata] stanza in limits.conf), and this search will not return metadata information for any more entries. I would be very grateful for your assistance here. Kind regards, Diirn
... View more