Dashboards & Visualizations

Not able to find sourcetype

Praz_123
Path Finder

Will i am seeing the events data is showing but there is sourcetype is missing for last 24 hours.

What could be the reason , how to check .

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123,

how do you read the logs? are they in a file?

if yes, check if in the file there are logs in the missing periods.

if not, the issue is outside Splunk.

If yes, your should check if they were writtend moment by moment or after a delay.

For this reason I hint to create an alert depending on the update frequency of your data (e.g. every 15 minutes).

So you can immediately check if the issue is in Splunk or outside it.

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123,

if one sourcetype was present and noy it's missing, there could be two reasons:

  • you modified the inputs.conf assigning the sourcetype to a data flow,
  • the data flow stopped.

You can check the first choice viewing if someone modified the inputs.conf that should ingest data.

For the second choice you should analyze, if you're still receiving data and when the data stopped:

index=your_index sourcetype=your_sourcetype
| head 10

Ciao.

Giuseppe

Praz_123
Path Finder

@gcusello 
Thanks for your reply , but the data is visible like in 7 days it will be like 6 days visible 1 day missing or 5 days visible 2 days missing vice-versa .

what could be solution for that 

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123,

you should create an alert when data flow stopped and immediately see if there something that blocked it.

then, if the data flow arrives from text files, you could see if in the files there are data in the missing periods.

Ciao.

Giuseppe

0 Karma

Praz_123
Path Finder

@gcusello 

No Recent Logs Found for Source: abc:conf
No Splunk ingestion for Glo_Pa Alxt Ingestion found in the last 24 hours for:
Index: glo_pa_logs
SourceType: abc:conf

 

How to find in SSH or in UI

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123,

let me understand:

if you run this search:

index=glo_pa_logs sourceType=abc:conf 

 in the last 24 hours, have you results?

have you results in the last 7 days?

running this search:

index=glo_pa_logs sourceType=abc:conf 
| timechart span=1h count

what are the results?

Ciao.

Giuseppe 

0 Karma

Praz_123
Path Finder

@gcusello 

Have a look in the ss able to see the data for last few days but not for last 3 days ,how to check that what is happen to the data for last 3 days .

Praz_123_2-1697475399343.png

 

Praz_123_1-1697475178019.png

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123,

how do you read the logs? are they in a file?

if yes, check if in the file there are logs in the missing periods.

if not, the issue is outside Splunk.

If yes, your should check if they were writtend moment by moment or after a delay.

For this reason I hint to create an alert depending on the update frequency of your data (e.g. every 15 minutes).

So you can immediately check if the issue is in Splunk or outside it.

Ciao.

Giuseppe

Praz_123
Path Finder

@gcusello 

Thanks for support 🙂

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Praz_123 ,

good for you, see next time!

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...