<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filename was different, therefore source is not indexed. Why? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12326#M889</link>
    <description>&lt;P&gt;You can check the duplicated events along with their time of indexing with the below query:&lt;/P&gt;

&lt;P&gt;index=your index sourcetype=your sourcetype | eval dup=_raw | convert ctime(_time) as T1 | convert ctime(_indextime) as indextime | transaction dup mvlist=t maxspan=1s keepevicted=true | table dup,source,sourcetype,host,index,indextime&lt;/P&gt;

&lt;P&gt;Process to delete the duplicated events:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Run the following command to store all duplicate events in a lookup table.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;index=* sourcetype=wsa_accesslogs | eval id=_cd."|".index."|".splunk_server | transaction _raw maxspan=1s keepevicted=true mvlist=t | search&lt;/P&gt;

&lt;P&gt;eventcount&amp;gt;1&lt;BR /&gt;
| eval delete_id=mvindex(id, 1, -1) | stats c by delete_id | outputlookup delete_these.csv&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Once search finishes completely by running the following command you can view the events stored in lookup table
| inputlookup delete_these.csv&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Note: You need to wait till your search gets complete. You can use smart mode as well.&lt;BR /&gt;
You can also check the newly created lookup table in the $Splunk_Home\etc\apps\app_name\lookups\ delete_these.csv&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Run the following command to delete all events from source type which also exists into lookup table (in your case its delete_these.csv)&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;index=* sourcetype=wsa_accesslogs  | eval delete_id=_cd."|".index."|".splunk_server | search [|inputlookup delete_these.csv | fields delete_id |&lt;/P&gt;

&lt;P&gt;format "(" "(" "OR" ")" "OR" ")"] | delete&lt;/P&gt;

&lt;P&gt;Happy Splunking&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 13:51:30 GMT</pubDate>
    <dc:creator>puneethgowda</dc:creator>
    <dc:date>2020-09-29T13:51:30Z</dc:date>
    <item>
      <title>Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12322#M885</link>
      <description>&lt;P&gt;I'm monitoring a folder but I'm not seeing all the files getting indexed into Splunk.&lt;/P&gt;

&lt;P&gt;Then I did &lt;/P&gt;

&lt;PRE&gt;index=_internal sourcetype="splunkd" log_level="ERROR"&lt;/PRE&gt; 

&lt;P&gt;and found several events indicating the reason files were not indexed. &lt;/P&gt;

&lt;PRE&gt;
04-26-2010 11:58:04.265 ERROR TailingProcessor - Ignoring path due to: File will not be read, is too small to match seekptr checksum (file=C:\Program Files\WebSphere\profiles\AppSrv01\config\cells\sfeserv36Node01Cell\PolicySets\WSReliableMessaging persistent\PolicyTypes\WSReliableMessaging\policy.xml).  Last time we saw this initcrc, filename was different.  You may wish to use a CRC salt on this source.  Consult the documentation or contact Splunk Support for more info.
&lt;/PRE&gt;

&lt;P&gt;I do not understand why Splunk is telling me that the filename was different.&lt;/P&gt;

&lt;P&gt;Help?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2010 03:18:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12322#M885</guid>
      <dc:creator>Nicholas_Key</dc:creator>
      <dc:date>2010-04-27T03:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12323#M886</link>
      <description>&lt;P&gt;Splunk performs a CRC check of the files it tries to index.  The error you report implies that we had indexed a file with the same CRC value.   Even if the file name is different, we will not index it unless you use the CRC salt parameter for the input.  This prevents Splunk from reindexing the same log file, even though you may have renamed it.   &lt;/P&gt;

&lt;P&gt;Sometimes, if you have a file that has the same few header lines, this will confuse Splunk as we don't perform the CRC against the whole file.  In those cases, you should use the crcSalt parameter:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;crcSalt = &amp;lt;SOURCE&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If set, this string is added to the CRC.
Use this setting to force Splunk to consume files that have matching CRCs.
If set to crcSalt =  (note: This setting is case sensitive), then the full source path is added to the CRC.&lt;/P&gt;

&lt;P&gt;For reference:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0/Data/Monitorfilesanddirectories" rel="nofollow"&gt;http://docs.splunk.com/Documentation/Splunk/5.0/Data/Monitorfilesanddirectories&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2010 03:26:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12323#M886</guid>
      <dc:creator>Simeon</dc:creator>
      <dc:date>2010-04-27T03:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12324#M887</link>
      <description>&lt;P&gt;Thank you Simeon and Wolverine! It works now with crcSalt = &lt;SOURCE&gt;&lt;/SOURCE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2010 05:47:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12324#M887</guid>
      <dc:creator>Nicholas_Key</dc:creator>
      <dc:date>2010-04-27T05:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12325#M888</link>
      <description>&lt;P&gt;Just to be completely clear about this setting....  Nicholas, you received this message on an XML config file which is where adding the &lt;CODE&gt;crcSalt&lt;/CODE&gt; setting is helpful.  But you should probably &lt;EM&gt;not&lt;/EM&gt; add this to monitors that are indexing traditional log files. The danger of adding "&lt;CODE&gt;crcSalt = &amp;lt;SOURCE&amp;gt;&lt;/CODE&gt;" everywhere is that it would re-index a log file after it is rotated, so you could end up with the same events loaded many many times.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2010 21:21:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12325#M888</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-05-20T21:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12326#M889</link>
      <description>&lt;P&gt;You can check the duplicated events along with their time of indexing with the below query:&lt;/P&gt;

&lt;P&gt;index=your index sourcetype=your sourcetype | eval dup=_raw | convert ctime(_time) as T1 | convert ctime(_indextime) as indextime | transaction dup mvlist=t maxspan=1s keepevicted=true | table dup,source,sourcetype,host,index,indextime&lt;/P&gt;

&lt;P&gt;Process to delete the duplicated events:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Run the following command to store all duplicate events in a lookup table.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;index=* sourcetype=wsa_accesslogs | eval id=_cd."|".index."|".splunk_server | transaction _raw maxspan=1s keepevicted=true mvlist=t | search&lt;/P&gt;

&lt;P&gt;eventcount&amp;gt;1&lt;BR /&gt;
| eval delete_id=mvindex(id, 1, -1) | stats c by delete_id | outputlookup delete_these.csv&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Once search finishes completely by running the following command you can view the events stored in lookup table
| inputlookup delete_these.csv&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Note: You need to wait till your search gets complete. You can use smart mode as well.&lt;BR /&gt;
You can also check the newly created lookup table in the $Splunk_Home\etc\apps\app_name\lookups\ delete_these.csv&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Run the following command to delete all events from source type which also exists into lookup table (in your case its delete_these.csv)&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;index=* sourcetype=wsa_accesslogs  | eval delete_id=_cd."|".index."|".splunk_server | search [|inputlookup delete_these.csv | fields delete_id |&lt;/P&gt;

&lt;P&gt;format "(" "(" "OR" ")" "OR" ")"] | delete&lt;/P&gt;

&lt;P&gt;Happy Splunking&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:51:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12326#M889</guid>
      <dc:creator>puneethgowda</dc:creator>
      <dc:date>2020-09-29T13:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12327#M890</link>
      <description>&lt;P&gt;Is there a way to delete the CRCs of the previous indexing activity? I deleted the index and the data input and basically tried to start over but my files won't index again.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 23:49:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12327#M890</guid>
      <dc:creator>_jgpm_</dc:creator>
      <dc:date>2017-08-22T23:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Filename was different, therefore source is not indexed. Why?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12328#M891</link>
      <description>&lt;P&gt;You could either empty the fish bucket or add a random crcSalt in your inputs.conf.&lt;BR /&gt;
Adding a salt will change the hash of the files and thus index them again.&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 07:00:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Filename-was-different-therefore-source-is-not-indexed-Why/m-p/12328#M891</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2017-08-23T07:00:50Z</dc:date>
    </item>
  </channel>
</rss>

