hello,
We recently set up Splunk on our system so we are still learning. We have an issue where we are not getting older events in searches. For example: Event id 4625 (failed logon), we can see the event on the same day it happens but the next day, it will not show up.
A few things I have tried:
1. removed the ignore older that 2d line in the inputs.conf file.
2. checked to make sure we are not over on bucket size.
Any suggestions on configuring this correctly? I can post config info if requested.
Thanks
The settings in inputs.conf have no effect on the ability to search already-indexed data. It only controls what Splunk reads in.
What is the exact search are you trying? Have you selected a time window larger than 24 hours?
The settings in inputs.conf have no effect on the ability to search already-indexed data. It only controls what Splunk reads in.
What is the exact search are you trying? Have you selected a time window larger than 24 hours?
thats what i was missing, thanks. guess its one of those days where i forget basic stuff...lol